3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:35 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:35 executing program 5: 03:54:35 executing program 0: 03:54:35 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:35 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:35 executing program 5: 03:54:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:35 executing program 0: 03:54:35 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 03:54:36 executing program 5: 03:54:36 executing program 0: 03:54:36 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 03:54:36 executing program 5: 03:54:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:38 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:38 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2000100000000a, 0x300) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x800280}, @nfc={0x27, 0x1, 0x0, 0x8}, @generic={0x2, "ccf737f2048df3cc1354d7cf14fa"}, 0x5, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)='nr0\x00', 0x6, 0xba}) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast2}}}, &(0x7f0000000780)=0xe8) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) syz_open_procfs(r6, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r7) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) r9 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r9, 0x200004) r10 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r9, 0x4c06, r10) r11 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r11, 0x200004) ioctl$PERF_EVENT_IOC_REFRESH(r11, 0x2402, 0xffffffffffff9310) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 03:54:38 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 03:54:39 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:39 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:39 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:40 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) fcntl$setstatus(r1, 0x4, 0x24400) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) listen(r3, 0x40000000) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x35b2, 0xe0b7}) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r4, 0x200004) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) r5 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r6, 0x40044900, 0x9) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r5) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fallocate(r0, 0x4000000000000010, 0x0, 0x7fff) 03:54:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:40 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1676.163240] audit: type=1400 audit(2000001280.483:1594): avc: denied { create } for pid=12017 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 03:54:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:40 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:40 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000016c0)) setresuid(0x0, 0x0, 0x0) getresuid(0x0, 0x0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x190) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) dup2(0xffffffffffffffff, r1) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)={0xa, 0x4e21, 0x1ff, @ipv4={[], [], @rand_addr=0x401}}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000380)}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f0000000100)="5cbc0a4cc395da7c11fbda0ea52d788f48712e6ec2be700b80918090a259d0584435d4e5abb86999196c0e749a5ab1515038471daadaecd1cea96e7da9817ea950664b5ceb015782e7fdbaa4739eb8d12f8bd421ddd88d3fe7ca5c108f3bcaf56e696dcb9bb93d1caf1191b5a81029f9c0ea8dd41b3946", 0x77}, {&(0x7f0000000180)="53ad9195426ef6f4297b899848318ebd212f0e5ee857b62188b32f19438b3d80a1a777eb592cda7e131a9d17", 0x2c}, {&(0x7f0000000600)="1d51a017869149f51d8da9676f17d0f6439299ea1f08e69765e488a7061050b47f440380d29d549aea7673c576e9dd816c4d7b422c8cf11a3007a0cd25e6771538b1", 0x42}], 0x5, &(0x7f0000001700)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfffffffa}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @dstopts={{0x110, 0x29, 0x37, {0x0, 0x1e, [], [@pad1, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim, @ra, @generic={0x2c, 0xda, "09a3646997bb4317334ba13c9c321db644b40d87931ee392ee3bcaa82382aace75128bf88b7213ed89a92a1917ee1c1a3a23bae6ec681ac8c15d316c14ea108f44099aa29b10223442d10d9d276c125fefe60719f8750d64d8bd22d79121aa58fccaa56212ac51948123879bfa6727f179c5009f874334bd849907b6072e9f3e22e6c7ecfb2562d32fd0c3ad735be85f771c3b321e92bf5012fb93a935854332b374eb8c1c2296047c03c246ae673311edd2160f8ed6fb4d90caf8d0303b1f5dffdb79a293cecd420453cd0d7f6ca85c5c3bcacc6c7adcfefa1f"}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @dstopts_2292={{0xe8, 0x29, 0x4, {0x2b, 0x19, [], [@generic={0x5, 0x95, "b17f97d0acba3471c505180a2cee9aeadd0c442cc12748b864a57b6478a5e9ff18ffcae892982bd372c78013fa38bcfed055e0be5b36e65c8573ed4bbd10015667bf4f1b246ab7c36155f5be01a906477d753b040f3b2ed8f1e2e95c2b71b82dcfedefd5cb45cb59e87fad7ef95f27fdca2d9d6c36e1688000fcb86c9e2824666b0d5cb0df6b5d5d6549e6c7e9f860382f9615d539"}, @enc_lim, @generic={0x1}, @hao={0xc9, 0x10, @empty}, @jumbo={0xc2, 0x4, 0xffff8001}, @pad1, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x0, 0x22, [], [@calipso={0x7, 0x30, {0x720d, 0xa, 0x3, 0x9, [0x0, 0x3, 0x0, 0x0, 0x9]}}, @ra={0x5, 0x2, 0x100}, @generic={0x2}, @pad1, @pad1, @generic={0x2c, 0xd2, "010d4d29e72a75574da6b734cd7baf97585ddf1d11fa9efe09f41aa3bfd88466b8c67c67f30ee20e819ab3487de77a83564c6242aad8b284c8ee72acd1318fe7bdf68b05e20baed8175e83dc53155cbb2ffad2e79a47490ad71ddca094e2a8ee175c41fda872345acaca28aca8612ba612b2c3499247e7368f8bf0dfb1d5ab72aae5e8b07c4fbb4f8ba58e1344145909b8d3571e882af1741d734e390dc5b683f2c00591246ed8aebb46e7bda59cb74d5eebf79f8772ecb092737b43a18a1d340965463859dd7cf379b502a2e3000f58f69b"}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x21, 0x2, [], [@pad1, @jumbo, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @hoplimit_2292={{0x14}}], 0x3b8}, 0x40000c0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r2, r0, 0x0, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) sendfile(r0, r2, &(0x7f0000000000), 0x7) [ 1676.601029] audit: type=1400 audit(2000001280.923:1595): avc: denied { create } for pid=12017 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 03:54:41 executing program 0: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='G\x7f\xc0\xb2\xeb>\x00\x00\x00\x00\x00\x00', 0x40, 0x0) 03:54:42 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:42 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:42 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:42 executing program 0: epoll_create1(0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40, &(0x7f00000001c0)="5c0ef0d122fdd3457182e522a76ade") fchdir(0xffffffffffffffff) r0 = getpgid(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) read(r1, &(0x7f0000000040)=""/62, 0x3e) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, r0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) 03:54:42 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x880, 0x0) accept$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) preadv(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/116, 0x74}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/29, 0x1d}, {&(0x7f00000011c0)=""/233, 0xe9}], 0x4, 0x1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000001340)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000001380)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001440)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x60c5e889feeaa5bf}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x30, r4, 0x200, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x13, 0x80000000, @l2={'eth', 0x3a, 'nr0\x00'}}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0xcc0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000001540)={0x1000}, 0x4) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000001580), &(0x7f00000015c0)=0xc) socketpair(0x3, 0x2, 0x0, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000001640)={'dummy0\x00', {0x2, 0x4e21, @rand_addr=0x401}}) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000001680)) recvmsg(r2, &(0x7f0000001940)={&(0x7f00000016c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001740)=""/139, 0x8b}], 0x1, &(0x7f0000001840)=""/222, 0xde}, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001980)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000001a00)=r8) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001bc0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r9, &(0x7f0000001e40)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001e00)={&(0x7f0000001c40)={0x1a4, 0x0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf1e0}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4a3, @remote, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xad}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffbff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff7fff}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'bpq0\x00'}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc42}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xde}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @remote, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x108, @rand_addr="ca80752aafb1dd5c2270c13d093e1abc"}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x6, @mcast2, 0x94e}}}}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x9000}, 0x10000040) pipe(&(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r10, 0x10, 0x9, 0xfffffffffffffffd) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, &(0x7f0000001ec0)={{0x2, 0x1, 0x7ff, 0x3, 0x2}, 0x4, 0x7, 'id1\x00', 'timer1\x00', 0x0, 0x9, 0x8, 0x5, 0x401}) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001fc0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getgroups(0x9, &(0x7f0000002000)=[0xee01, 0x0, 0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, 0x0]) ioctl$TUNSETGROUP(r12, 0x400454ce, r13) r14 = add_key$keyring(&(0x7f0000002040)='keyring\x00', &(0x7f0000002080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_QUERY(0x18, r14, 0x0, &(0x7f00000020c0)='/selinux/avc/cache_threshold\x00', &(0x7f0000002100)) [ 1678.395636] ip6_tunnel:  xmit: Local address not yet configured! [ 1678.546534] audit: type=1400 audit(2000001282.873:1596): avc: denied { create } for pid=12070 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:54:43 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:43 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 1679.008941] audit: type=1400 audit(2000001283.333:1597): avc: denied { create } for pid=12070 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:54:43 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000680)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14}]}]}]}, 0x44}}, 0x0) 03:54:43 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f00000000c0), 0x4, &(0x7f0000000400)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0x68, 0x29, 0x0, {0x0, [{{0x0, 0x2, 0x6}, 0xf2c5, 0x3, 0x7, './file0'}, {{0x36}, 0xfff, 0x45, 0x7, './file0'}, {{}, 0x0, 0xfd, 0x7, './file0'}]}}, 0x68) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sysinfo(&(0x7f00000003c0)=""/50) 03:54:44 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1679.951166] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 03:54:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x4008, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="7d2bacadbe1dedb7ce59040000268426f2ceceadd44a29deeac8c0a4c34285150e8b10088e582cbf994474f9127624e7d79af649b0e435136ccc53323998d3a989d9f0cf0857942724c4c338038a8968523e5dc5e35ecf2bd740d6886cf4d549ea7e08e95f73df62bd176832898dcfb99ef1147c5681c1"], &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) 03:54:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:44 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:45 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[], 0x4c9) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$clear(0x7, r1) r2 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='-securityvboxnet1\x00', r1) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="97", 0x1, 0xfffffffffffffffb) keyctl$read(0xb, r3, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000380)="9698dbb56dd68937e5d2369b6932562c029e43409ccf5a90ad2df62fe1bf8994cb96c94632d20745ecae0c794767eff894c9c8b1364d6b6572e027be622949c82c235d02561a23c30a2b42303c03809154b37a1fa4aed60379bbb8b0f2d7976a5497c08ddbaa0091592d02979206791ded742bc74dfa1a057aca0b35c72b202cd1f45e6c9c35dbe9362a659dc3314632f8c7dbcb4ffc7693bc2976a24f3a02138e49ad43efb5762927789ef13fbc", 0xae, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, 0x0, r4}, &(0x7f0000000440)=""/45, 0x2d, &(0x7f0000000680)={&(0x7f0000000480)={'nhpoly1305-avx2\x00'}}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r6, r5, 0x0) ioctl$UI_SET_PROPBIT(r6, 0x4004556e, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x2, 0x245c2) r9 = memfd_create(&(0x7f0000000100)='\x00', 0x2) pwritev(r9, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) sendfile(r8, r8, 0x0, 0x24000000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r8) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7000008, 0x110, 0xffffffffffffffff, 0x3fc56000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, 0x0, 0x0) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, 0x0) [ 1681.787017] audit: type=1400 audit(2000001286.103:1598): avc: denied { associate } for pid=12187 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 [ 1681.922855] audit: type=1400 audit(2000001286.243:1599): avc: denied { associate } for pid=12187 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:54:46 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 03:54:46 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x12) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)) 03:54:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:46 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:46 executing program 5: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x8, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='bridge_slave_0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1682.549536] audit: type=1400 audit(2000001286.873:1600): avc: denied { create } for pid=12194 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=0 [ 1682.615031] audit: type=1400 audit(2000001286.933:1601): avc: denied { create } for pid=12194 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=0 03:54:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:47 executing program 0: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x4c, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a634840000000000000000000000108000000000000000000000000000000000000006f190013c6921e0ecccbef2500"/71], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 03:54:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1683.033562] binder: 12219:12221 unknown command 1078485770 [ 1683.078684] binder: 12219:12221 ioctl c0306201 20000180 returned -22 03:54:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) dup2(r2, r3) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) r6 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r6, 0x200004) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', r7}) 03:54:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f00000003c0)) r1 = socket$netlink(0x10, 0x3, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) writev(0xffffffffffffffff, &(0x7f0000000140), 0x8) rmdir(&(0x7f0000000380)='./file0\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) syz_open_pts(r3, 0x0) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x777c3432ea801bb5, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100070c10000000000000000000", 0x58}], 0x1) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x3) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) 03:54:49 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 03:54:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) io_getevents(0x0, 0x0, 0x9, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000008c0)={0x77359400}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000010200000000000000000000000000000b055fef59b10306244d086bff4a93a1b71388aae4c6dc4b564489bbd0027ee70ffb296d61993b1eacddf292297dfad0665d750a29ee35a215849abfdee30675ff261e2cfeaf76e2d46e9fe2a27544b653082ed9e7c14cb7f52ec282cedac6f1670a364736257889fec333812dc911c042d5156b7d1274b28d2264d63e330f889f8cdb27c265c494d24", @ANYRES32=0x0, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES32=r0], @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESOCT=0x0, @ANYPTR64, @ANYRESDEC=0x0, @ANYRESHEX=0x0, @ANYRESOCT=r1, @ANYBLOB="2d8af595c91de5ae6ecd6661a2d7a13669f4db2f87604a35da6d6836d860e13477d923ffabfe", @ANYPTR64], @ANYBLOB="9be1fa4fcaa4657959c923de14177cef4ea82c84c5f119378f8fb499e06f61", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r2, @ANYRESDEC=0x0, @ANYBLOB="ffe360b5a33d25168f2dfe7fd41b0834ddaf05f2bd9dfd1252adf37bb892327f374fdb4a90fc30892b2b20b1bb8ac3ccdfa2ee17e3ab3395732f35ed5024cd3287a3eafe2011eec70f97b8c3281bb4129850f13167a1b3aac686a9803b0204a82497db3a87c23cba2f4a4221a598a7837f6a24842e2b29eed01805b61f970e914a4191de7fc060ffae70695cffce88d20eb89adf854225a9a50aa3de78bc8a2f6a56f89ef07b4aff856d25de09", @ANYBLOB="7667a62063866f989bf1383f8f9b38ab384a255af1d6194b8885a5e51401502b4f7cceb3e7a52020ac086966c507dbca946c7783b29abbf0c5c6420e260dbe78c6a8287a42be27c3b0dbd3948d4e80742ceaad7bba66be09203f2671c8d7bef5733c754d942458c4d9642b314dce9168165a7dfb1fc89e08587ccf38dd0058b03b7f14efbc150ced652a4a5b8dc263e3bfd8d8faf1746345af668e9f09d4aaa45b9344d586914fae938bc96c5daf07af0c55d87a342e84eac304f819288c9216fc029efb835f0ee7", @ANYPTR, @ANYRESHEX=r3, @ANYRESHEX, @ANYPTR], @ANYRES32=r4, @ANYRESDEC=r5, @ANYRES16]], 0x3}}, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r6, 0x54a3) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0xffffffffffffffe6}], 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r8, 0x200004) r9 = accept4$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10, 0x80800) ioctl$sock_inet_SIOCDELRT(r9, 0x890c, &(0x7f0000000300)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)='veth1\x00', 0x100000001, 0x7fff, 0x7f}) r10 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r11, 0x200004) setsockopt$IP_VS_SO_SET_STOPDAEMON(r11, 0x0, 0x48c, &(0x7f0000000140)={0x2, 'nlmon0\x00', 0x1}, 0x18) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r10, 0xc0145401, &(0x7f0000000100)={0x0, 0x0, 0x6162, 0x3, 0xffff0001}) 03:54:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x5) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) setgid(r3) setgroups(0x1, &(0x7f00000000c0)=[r3]) r4 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r5) syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') 03:54:49 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:50 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)) r2 = dup2(r0, r1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x10000001}, {}], 0xff91) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) r3 = gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) write$input_event(r2, &(0x7f0000000040)={{0x77359400}, 0x1, 0x3ff, 0x7}, 0x18) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{0x303}, "d6614bdf4dd5c531", "e39feb828f88cbf3c08f123628c9c920", "fc786634", "0002186958ee9197"}, 0x28) 03:54:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:51 executing program 0: io_setup(0x80000000, &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) pipe2(&(0x7f0000000240), 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids\xff\x91ventq\x00\x8c+d..\xb1\x88[\x87\xb8\x8e\x80\xf9\x1cV\xcb\x7f\x96\xfd\xbd\x06\xf1\xc5\x8ap\x00\x9ays7\n\xbc\xb7\\\x16\xedk\xdf\rS>UC\xb0Z\xa7\xd5\xc3\xab\xef\xb6n\x9e\x86\x9c\x1f\xa2\xd6r\x12\xa0\xb4\xb5!\xedA\x81\xa7\xccV\x03\xd1<\x92m\b\xcb\xe8\xa4D p\xf7\x99E\xb8\xbc\x06\x7f1N\xff\x96\x00\xe6rS\xf1\xae\xa0\x03\xa4~\xaf\xae\xbc\\\"?7\xca3Qd\xdd\x1a\xe5\xff\x80\xfe\xd9o\x8f\xd1\xd2\xb8%+\xcb\x12KT\x8d\x9f\x82\xbas\x15\x83\x9e\xf8\xac\x8d\xf4*g\x0efu\xba\xd2;\xdb\xbe\xd3{k\xf8Z\x03>\x8cB\xda\xd4\xe8\x91\x02\xfc\x0ep\x05W\x15\x980E\x16\xfe\xa5\xac8R\x96\xc1\x11\xbf\x81\xed\x8eM\xa8', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getpeername(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) wait4(0x0, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x80) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) write$binfmt_aout(r5, &(0x7f00000004c0)={{0x10b, 0x80, 0x20, 0xe2, 0x119, 0x8, 0x2bf, 0x7b4}, "150b08620fd5df6739ae5889ea76f12b4e4461e58238aad602af87e09492be656450de7f7cf43c2aa1b08fe39dec0827b799ebd718aedb47637624d0df20c8d5454e43a55e4526c184fa35a666395d1064fbefd5632ac5e52ad9b7ee172fa72883d0185ebfb6e8cadfd2c5cdf86ffa303fe1afecdde24cd6e2457e806c01745ddc33e71a273bbf484fe86af0a1c9384512f39074d709683ee1f22e3ae64c8a535d17f9e726ebb20a484b9870c8dbf94985c0e049b16f4f216e35d162fc9845433c88c176059897a7d02aa21daf7b50bcf68467e3409aed054ea16faa962d8781", [[], [], [], [], [], [], [], []]}, 0x900) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0xff, 0x7fffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) 03:54:53 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)) r2 = dup2(r0, r1) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x10000001}, {}], 0xff91) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) r3 = gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) write$input_event(r2, &(0x7f0000000040)={{0x77359400}, 0x1, 0x3ff, 0x7}, 0x18) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{0x303}, "d6614bdf4dd5c531", "e39feb828f88cbf3c08f123628c9c920", "fc786634", "0002186958ee9197"}, 0x28) 03:54:53 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:53 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:53 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, &(0x7f0000005480)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000380)=0x1b) rt_sigaction(0x9, &(0x7f0000000140)={0x0, {0x3}, 0xc0000001, &(0x7f00000000c0)="74bef3480f1ec8c4e17e1672b367360fdfb093000000660f5728c4e2ed0074a100c4a1e973fb04c423497d51f1390f01d9c4028dddbefeefffff"}, &(0x7f0000000300)={&(0x7f0000000240)="f30f01ea47d0e7c48131fb5dcdc442999044f108c4a17d28a200000000400fac630f7fc481ef5c9077e10000c401dd61b29c000000660f3adf9800100000f3c423694b218c", {}, 0x0, &(0x7f0000000180)="c4a3657852d300f0833228660f175b5c45ff9260730000410f15d265f3440f1b995e0d000030d23e2e36660f383f43a8660f382a03c44141e45d32"}, 0x8, &(0x7f0000000340)) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000003c0)={0x1, 0x70, 0x59, 0x4, 0x2, 0x1f, 0x0, 0x100000000, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x4048, 0x2, 0x8, 0x4, 0x9, 0x7, 0x800}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) 03:54:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:53 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x8982, &(0x7f00000002c0)) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:53 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:53 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x8, {0x0, 0xfff9}, {}, @cond=[{0xfee5, 0x3, 0x40, 0x7, 0x5}, {0xa9, 0x8001, 0x1, 0x4, 0x0, 0xffc0}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3cf6ec14769d7cd08df815a6185f08f4948a5378ba2570a76187e69af274ef19aeacd1cd450f7755af28"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:53 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)}}], 0x1, 0x0, &(0x7f0000005480)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000380)=0x1b) rt_sigaction(0x9, &(0x7f0000000140)={0x0, {0x3}, 0xc0000001, &(0x7f00000000c0)="74bef3480f1ec8c4e17e1672b367360fdfb093000000660f5728c4e2ed0074a100c4a1e973fb04c423497d51f1390f01d9c4028dddbefeefffff"}, &(0x7f0000000300)={&(0x7f0000000240)="f30f01ea47d0e7c48131fb5dcdc442999044f108c4a17d28a200000000400fac630f7fc481ef5c9077e10000c401dd61b29c000000660f3adf9800100000f3c423694b218c", {}, 0x0, &(0x7f0000000180)="c4a3657852d300f0833228660f175b5c45ff9260730000410f15d265f3440f1b995e0d000030d23e2e36660f383f43a8660f382a03c44141e45d32"}, 0x8, &(0x7f0000000340)) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000003c0)={0x1, 0x70, 0x59, 0x4, 0x2, 0x1f, 0x0, 0x100000000, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x4048, 0x2, 0x8, 0x4, 0x9, 0x7, 0x800}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) 03:54:53 executing program 5: socket$packet(0x11, 0x2, 0x300) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, &(0x7f0000000040)=0xfc76e4a4e14c28fd) perf_event_open(&(0x7f0000000040)={0x1, 0x39d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x200000, 0x8f) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket(0x10, 0x5, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(r2, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000180)) getsockopt$inet6_udp_int(r4, 0x11, 0xa, 0x0, &(0x7f0000000340)) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 03:54:54 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1690.226462] audit: type=1400 audit(2000001294.533:1602): avc: denied { create } for pid=12380 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:54:56 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:56 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:56 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/s\x8b\x90%\x95\x90mer\x00', 0x0, 0x40) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x3) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, 0x0) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r3, 0x5413, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) 03:54:56 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc1515e8e00000100004c117eb6009b3d815c8d5286dfaccabd3bbf1f684a17f373be7fe52805565c60ed8185110e7585104a0be5e7615993a9ec3093cb9f7eda9c1cdd8f738f362b83eb9507c0ef2bf799f903262b5d81e59c63a1659f91f72b49ed29432c5d21423d01b19b17c3ab10b87e79a4c1522854a538a08a8543b67bf060091fce26d6a36e688c41b8e8820bb5798dcc988221f3f51cd38785fcfaa1f583a94ed58b801adae4a1f5b13738d66af861da87d152b9fc1012519ede057fef2f2e28dfdc9796a06f4a7b1764c66c8b21a57fe631b8918c8098ea441cb0"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 03:54:56 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x0, &(0x7f00008feff0)={0x0, 0x224}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffb) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x400024c, 0x0) 03:54:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:56 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x67f4b711fdbc7120, 0x0) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000200)=""/4096) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000004400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000100)={'security\x00', 0xa9, "c259abb5f49e14e3e6aca024152543adfeeb82db0ed5f36f40bbc9f4e26b9f1a45224d138b09dfc8dc248ad0120b7c0c239da64b953e3db8e7ccff95b8d9bc815ef47048c7b190e20a485d1526faaf6237ce60946d74840cc0c01b983efa23a4bbb6169e444baed9e28f0f28b09c9fac058479afee062351cbfab22fa04020b82f4dfd0f2d05dbe1b96379a02e9dcc86e529301ee4501c2e240e30231ae794245ac6d5ab3d4db45df7"}, &(0x7f0000000000)=0xcd) timer_create(0x0, &(0x7f0000044000)={0x0, 0x14}, &(0x7f0000044000)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 0x4246606a}, 0x5c7, 0xffffffffffffffff, 0xacf}) timerfd_create(0x5, 0x400) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 03:54:56 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00h_V'], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:56 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:56 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r0, 0x7439) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000280)={0x2, r2}) fcntl$setlease(r1, 0x400, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r3, r6, 0x0, 0x1000000000e6) 03:54:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1692.940484] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12451 comm=syz-executor.5 03:54:59 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x3, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e6693a9f", 0x4, 0x0, 0x0, 0x1}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f00000005c0)=ANY=[@ANYBLOB="ee33bd6667e869936ad076318906000000"], 0x11) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f00000018c0)=[{&(0x7f0000000780)}, {&(0x7f0000000880)="90", 0x1}, {&(0x7f00000008c0)="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", 0x741}], 0x3) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000280)=0x9da, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="5001000030a6ad20157dbc0600000000fe8000000000000000001a05087eb769e6b4627d09000000001e00cbf31f991c00"/64, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="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"], 0x4}}, 0x0) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$inet6(0xa, 0x803, 0xa5) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x2}}, 0xe8) sendmmsg(r3, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) open(&(0x7f0000000040)='./file0\x00', 0x400001, 0x21) r5 = getpid() rt_sigqueueinfo(r5, 0x37, &(0x7f0000000580)={0x1e, 0x7f, 0x2}) 03:54:59 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="cfd5c700"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63dffc6cd7c8019573b363de4f69", @ANYBLOB="e62322cb1bc151de8e0000017b9ed40d4f0c65ff6060f7c800004c6f929c6dce4d43f38d5286723f5be13e17ba7ee3fc183682b362da0a286348423bdb3a152771c5fe729637adf8c5e286b84562f8806233b1cb94e0b618cf1d5f659cafc3009fc766a4543642135399838835d0f9d573f51dbc45075760002603c797eef038aa55d6e0ffcadc8d0a28d4b5a6f8f07680a0305bad919b66ca5904762651b614c3d15087af4e1c1c495c733ec23b4aca0aa56d1a7951dc11b6ba64775457e4e061330bf2713025f0"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(r1, &(0x7f0000000040), 0x8, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:54:59 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:59 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r0, 0x0, 0xfffffffffffffdc1, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000940)={'syz', 0x0}, 0x0, 0x0, r0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="5e4e80ae672f1359bc11c79ea37ae3c58a6e2035c7ad9b778465793d425292c4363c509a907103e3e0b7eb9c4224dd87dc325be6636efeda939ac673454198aec9e4916e3102a730abcd24da6460f7b0e5a19bf107f76aa413405037eab51775e281128c18762c80310b3975676c", 0x6e, r0) r2 = add_key$keyring(&(0x7f0000000580), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$reject(0x13, r1, 0x8091, 0x9, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) sendmsg$nl_netfilter(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYPTR], 0x8}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r3, 0x0, 0x0) 03:54:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:54:59 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:00 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b1c72e9eea9905a9c5c47fa4fb4ebf48387aaf6721c774154c51506310"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x2) accept4(r1, &(0x7f0000000200)=@l2, &(0x7f0000000280)=0x80, 0x80000) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) ioctl$BLKRRPART(r2, 0x125f, 0x0) 03:55:00 executing program 0: syz_extract_tcp_res(&(0x7f0000000140), 0x6443, 0x80000001) prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x10080, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc4800) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x4, 0x0, 0x6, 0x2, 0x12, 0x0, 0x0, 0x0, 0x3}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, 0x1, 0x81, 0x89, 0x9, 0x1}) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00', 0x2) 03:55:02 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:02 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1800007, 0x11, r2, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) dup2(r1, r3) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x3fe00) 03:55:02 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='em0-)\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='system^[\x00']) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:02 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) chdir(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) write(r2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x680, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) setpriority(0x0, r3, 0x1ff) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, &(0x7f0000000140)="bd801b3fb5e8d75a38c3d47588c6c506410e60dc24bbc19fd2354ba8ed4609323cba98266775fd33241a46b50b4f41ea08ae") ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)=0x10002) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000240)='./file0\x00', 0x80) syz_open_pts(r5, 0x11000) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000001d00)=[{0x0, 0xfffffffffffffd97}, {&(0x7f0000000a80)=""/65, 0x41}, {&(0x7f0000000b00)=""/211, 0xd3}, {0x0}, {&(0x7f0000001c00)=""/189, 0xbd}, {&(0x7f0000001cc0)=""/42, 0x2a}], 0x6, &(0x7f0000001d80)=""/173, 0xad}, 0x100}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002340)=""/189, 0xbd}, 0x2}, {{0x0, 0x0, 0x0}, 0x3ff}, {{0x0, 0x0, &(0x7f0000003040), 0x0, 0x0, 0x13d}}, {{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x6}], 0x5, 0x40000000, &(0x7f0000004e80)={0x77359400}) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='mounts\x00') preadv(r6, &(0x7f00000017c0), 0x1a2, 0x0) 03:55:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:03 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) lremovexattr(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)=@random={'osx.', 'ramfs\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x800, 0x8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000001c0)={0x21, 0x3, 0x0, {0x2}}, 0x21) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000200), 0x7}, 0x10, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000000340)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000280)) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ioprio_set$pid(0x6, r3, 0x10000) fchdir(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="ff0300ec1400001b03000000000000"], 0xf) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 03:55:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:03 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:03 executing program 0: pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r4, 0x0) read(r2, &(0x7f0000000000)=""/250, 0x128b9372) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f0000000140)={r6, r7/1000+30000}, 0x10) 03:55:05 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:05 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:05 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl(r1, 0x9, &(0x7f0000000240)="8937535c91be6d2b103181b2884cf228bbafe56888a717143deac6ba3640bbcaab233e") ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x200, 0x58) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r3, @ANYPTR64], @ANYRESDEC, @ANYBLOB="f9b67807d470ee00e4fb97e81466e85f132e177dbb941b4cfdd60710c6155d04a25e4a4ae52680ae872e7728e37439baff9b", @ANYRES16, @ANYRES64=r4, @ANYRES64, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRESOCT=r5]]], 0x0, 0x59}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) gettid() ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000280)={0x188, 0x31a, 0x10000}) syz_open_pts(r7, 0x100) syz_open_pts(r7, 0x0) ioctl$TIOCSISO7816(r7, 0xc0285443, &(0x7f00000001c0)={0x9, 0xdd, 0x7, 0x200, 0x913f}) r8 = pkey_alloc(0x0, 0x3) pkey_free(r8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:05 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) r2 = memfd_create(&(0x7f00000000c0)='\x03\x11&\xe8\\\x19\xd8\x87o\xb0i\xddi_t-\xfc\xd7\xa8\x9a1{-\xbf!\xd9\xfe\x8b\xf4O!Y\xf4o\xef\x90\xcf\xce\xe7\xfa\xce\xb0\xa02\x19\x93\x1a%CZ\xca\x81\x00\\\x1d\x1c)42\xb2\xdd\xd1\x87|\xe1X\x1aby\xedo\xa2+z\xf6i$\x84s\xd2eT\xd0\xd1g\xc0\x8c8,TQ\xa8Bz\x96:\xdaq/\xd1\x98\x93\xafyu\xccV\x99\x87\xce\xd5Q\xab;OOPr:i\xd2\xb3-i\x00\xbc\x19M\"\xd5s\x85\xa7Bo|\x95\xd0\xbc\xbc-\x80lS\t-H\x86Y\xe2\xde\xd4K\\\x1dF\x87b\xf2y=\f\x12\x8aw\xfc\x17\xa69/w\xeaH\x80\x90.\xf4\xbf:\x95!RO\x0f\xf3\x02\x01\xa0)\x8bL/\x81Zo\x0e\v<\xf1_\xd3\xde\x0eB', 0x0) pwrite64(r2, &(0x7f0000000040)='o', 0x1, 0x8427) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000080)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x10000000000000, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:55:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0002020000000000040100c910ff010011000000009e79f26337296b0b000000622db173ca9a177af8b0b259e59956150732cd5e0ef1383902dbee00492a3dfec54984d30c0198d3ca990e8712a7ac3658c1007e6b9036229e1011930a9b712486c396ed7d79fbdb43eed3d1ffc21a53af1a4cb373ecce659bb707915332e981c43c0cef5679a939bbb019dccadf8d55a65867a9c0aec15c905c771f0130859bc801ebce2ee8321d7053b55be9f5d3f6fd65d447a513bbb8e11f018000004a54787e75a0ae09b19358be85804baada659ddfdb260158746934421341335443fbb08a0995dd5d05632869b8e3f916185e37ff57f99a1b66e84f249a2228fcae6eedfad40c06da88f2828c9cf86aa633c8750e8e20de0be36cc85f0a91d63fd2f24fb0ae824ded0a0450d9c9674786f7a8eb95db57a465df3b41fa6021a4d215ca8bc7f8f30caeded722fa4dc6e11a753fd68682625384442c8cd8e897247c8c935c39a0e36b63a0f094bb6e67f3e643daad37f6960f070d4003199f7853531fc652825c5c4ae215c5ab0356e9362e7dc61a90f09f0c83a4f5b969c21b3d2dc4e64f58df3338bd508f682e5d30a6459e7bf2ceac2da2061d5136c6e8685116ecc7d436e2377a66941e7b334647b43270a42fb5624f869fbdd6dd98ce2fb2125cf8db655db91f8ca98d99663d025ccd4c29abb8c09497d061cd7f16592fcb0b38d01cf3be08722110061e4c182ae2e70a3549d5193e2c4bd79fb13fc25b65101e0473c98760c91d0837c5ebfc041379ae462b233ce1645ed547e0487c1f436f462d2ac78d158ccc5f4f1974481fe40211d626110961b6914f149ec57e55e595d750b5a536cbc9de7a8a00000000000000000000000000004a9f4acd9692c65fe458b03f6b6a80b87f36961edae42a31362f6f0e1fadfdce532101a3e14bf5066eac"], 0x20) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000ac0)=""/4096, 0x1031) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x31e, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r7 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r7, 0x200004) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r7, &(0x7f0000000040)='./file0\x00', 0x400) 03:55:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:06 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:06 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:06 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000002c0)) r1 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000280)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:06 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0xfffffffffffffd58, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r1, r2, 0x0, 0x200fff) epoll_create1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x142) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f00000000c0)) close(0xffffffffffffffff) 03:55:06 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:07 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:07 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:09 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x10000008}) ftruncate(r1, 0x200006) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8000fffffffe) 03:55:09 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='jffs2\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) gettid() mount(0x0, 0x0, &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:55:09 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:09 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000300)=0x0) get_robust_list(r2, &(0x7f0000001480)=&(0x7f00000003c0)={&(0x7f0000000380)={&(0x7f0000000340)}}, &(0x7f00000014c0)=0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = add_key$keyring(&(0x7f0000000580), &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r4) request_key(&(0x7f0000000780)='cifs.spnego\x00\x1f\xbf\xd1\xed\xc4C\xab\x88\xa2\a\xd8G\xff\xe8\x82\xca\xdb\x91$\x94\xcdF\x82\xf1\x10\"[\x857b,8\x8a\xe9O\xb3]\x8d&\a\x99\x15\xb5\xd8Ce=\xa5\xec\x13:\x97\x1c\x16\xa0\'9\xb3\x04^)l\xb1b\x88\xb8\xfd\xf6\xd3\xa8:\xaa=+\x0e.\v\x93\xf8T\x17\v\xae\x8d/\x98\x9eI\xda\xa4\xe3\x05\x13Z\xc8\x89x\x9b\xd8I\xf4\xc6\xd7\x87XHIL\xc4\xd9\x8f\xe3\xe2Q\x99\tB\\\xb9\'\xf8\x88`(\x89\x88Z+\x1f\x98Z\x14|\xf2\x04\x9e\x84\xc9a}7L\x04\xf7\xef1J\xf8\x9b\x92\xf2\xb1\x82\xbc\x8b\xad\xa0\xf0\xb4\xe7\xa5\x91\xf4\xc3\xf7\xf1\xd4\r\xe1\x9d\xe47w\xe3^\x91\xa4\xd0\xf1{\xa1\x067\xe6\xea\x90\xea\x10@\xb5d\xbf=\xe5\xeb\x00'/222, &(0x7f00000002c0)={'syz', 0x2}, 0xfffffffffffffffd, r5) keyctl$get_persistent(0x16, r3, r5) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000440)={0xe, 0x8, 0x9, 0x30, 0x1000, "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"}, 0x100c) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000005c0)="71ac4a3a5353b07dcf5b1f788b3089b3abaccee009a157ff15939842ee78928507cc43abbb691cda7ad9603ede17278606bb297704861bbedb6740913a7e69fa629366a7e16cb360af52bf099dc4fe9d19ecc7e0b56f74abf9da6655874d83f22640eddab7b3d65a9e48e365cfe61440a268581bcb10bc0e2586b2c1ce3f8f793ffec49b86d399a9b0e759d8c9fe8080425a654e83d13f959a688e0f0bf566a2db13d0394c86d18e46f57975147c6921e791e1d9f281ce2b235d0e1db06fbfe9dd9d7236271fb49d0e5f11521881323ff5685e32e1113854a8ae2bc76bafdf5330e86091b54965", 0xe7, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) shutdown(r0, 0x400000000000001) socket$netlink(0x10, 0x3, 0x0) 03:55:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000056c0)=ANY=[@ANYBLOB="080000000000000002004e2300000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000f7ffffffffffffff00000000000000000000000000000000000900000002004e22e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e207f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e237f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003e6189e434f1ac435cf441e562e2a8000000000000000000000000000000000000000000000000000000000000000000001f00000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1e00010000fbffffff0000000000000000000000000000000000000000007dce0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a91b11df87f529f1c18ee63ead7ef540e868c206019cddb2597995531caf872a59b1cc0ca2ce31c652150c86523991c2a0e8100654c6554e268bc2434af24240696f74e8a3d7e080cc50dac6a3dd65e8d72f71c2cb1a34023103f41cb693432ffc8317c64b6e1af250dde06edfd77f929483de9b86c40f5844014c2742cecd9c07a52c9fdf1cc79e1800000000000000381a41abf98cf3"], 0x510) r3 = fcntl$dupfd(r2, 0x605, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsetxattr$security_capability(r1, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x59d, 0x6}, {0x0, 0x40c}]}, 0x14, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x9}}, @const={0xb}]}, {0x0, [0x30, 0x61]}}, &(0x7f00000002c0)=""/83, 0x40, 0x53}, 0x20) read(r7, &(0x7f0000000380)=""/178, 0xb2) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) clone(0x10000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r8 = getpid() rt_tgsigqueueinfo(r8, r8, 0x16, &(0x7f0000000100)) ptrace(0x10, r8) ptrace$cont(0x3, r8, 0x0, 0x20007ffe) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xffbc) pipe(&(0x7f0000000240)) getsockopt$inet_buf(r4, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x70, 0x4) bind$inet(r9, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r10 = socket$packet(0x11, 0x3, 0x300) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$packet_int(r10, 0x107, 0xf, &(0x7f0000000000)=0x80000001, 0x7c) setsockopt$packet_tx_ring(r10, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendto$inet(r9, &(0x7f00000012c0)="07268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 03:55:10 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:10 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pause() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000000605d2f7739ad16d8c861382b73e1431249e97ec16b31b5491d3252884db1d65fec4f618ae8aed551721e25db83895669c941e2510dc6d19afdde4705a9ffffffff41ff3c9eb68ac53e1a5e42dcf2601ad38237733585caafc45702c078d9cdfc99776142162a96deca4416a993ee6450f74fee21d0d9e21aa1783a0943bcf5b421d3eb9ad4905059e386cab2baa7d7555636687546889b1edcc48c55720187d605a1a3a2e79a446c2a670f2ddd54175740aa9fb31fc9588ea4f0e229c87745f289a0b48e29f172ae1bc51b03d9b48f2371970000"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e0000010000860000000000000000000000eac076dbbf38d9618a8fbe83e8584c5a3042a97b20db43ebc24f03acd80e8b3670c4f3c2d7bb31b8a66606921e97f1a92a6444635db6d46d4755f687409600"/103], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) pread64(r1, &(0x7f0000000280)=""/209, 0xd1, 0x5b1a201d) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) fsetxattr(r2, &(0x7f0000000200)=@known='system.posix_acl_default\x00', &(0x7f0000000240)='selfem1@]vboxnet1bdevGPLposix_acl_accessem0self\x00', 0x30, 0x2) r3 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r3, 0x3b) openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x40, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') r7 = add_key$keyring(&(0x7f0000000000)='\x01\x00\x00\x00\x00\x00V\x0f', &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r7, 0x0) r8 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000700)='SEG6\x00', r7) r9 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, r8, r9) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80020010}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000004b46891c321a34768492069bfe8af39c64c0dc987a58d70722e71f3928935c3789ff7d16ed28cdad18626a1f24971c24e1ff770fe10f0d06f9dfea244ba24673affed4c04e5cdf70a517ce36efaed5b09350fc46ddc0fdca481967a10df8f3bfa727802cf25f5725c1d87f61219dad6dab93afc66872db012920d04e71d4ce2b0b56eef945ef41ff8aedad44ec78e81ba48147b069", @ANYRES16=r6, @ANYBLOB="000228bd7000fbdbdf2501000000180004000600000002000000ff000000070000000700000008000400ffffff7f0c000400000000000500000008000300870000001400010000000000000000000000000000000001"], 0x5c}, 0x1, 0x0, 0x0, 0xce39cd5870911c61}, 0x1) sched_setparam(r3, &(0x7f00000001c0)=0x3b) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:12 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:12 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, 0x0) setuid(r6) lchown(&(0x7f0000000180)='./file0\x00', r6, r4) getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, 0x0) setuid(r9) lchown(&(0x7f0000000180)='./file0\x00', r9, r7) r10 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r10) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r11) r12 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r12, 0x200004) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000240)=0x0) r14 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r14) r15 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) r16 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r16) r17 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r17) r18 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r18) r19 = socket$unix(0x1, 0x1, 0x0) r20 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x20000) close(r20) r21 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r21) r22 = socket$inet6_udp(0xa, 0x2, 0x0) r23 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r23) r24 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r24) r25 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r25) r26 = dup3(r25, 0xffffffffffffffff, 0x180000) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r29 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r30 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r29, &(0x7f0000000000)='./file0\x00', r30, &(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000004c0)='system.posix\x9c\t\x00\x00\x00\x00\x00\x00\x00\x00ac\x03n\xf58\x00;d\x19G(5{E\xd5\\\xe79\n\x18\x00Xo\xddq\xec\xf7\x11\x13q\xba\x17\x9b\xb7]R\x9e\x0e\x19\xdc\x8fF\xe7\xfc\xe6\xfai\xd4j\x8cx\xb5\xb9\xa9\xf4\x82\x96\a\xbb\xe9*\xb3\x11\xcez\x9a\x91\xab\xd3m\x95\xfe\xab\xf9\xcc\xb7\x85&\xc0|\f\xd7\xa2 >o\x19/\xd1aC\xd3\xd7\xe5\x8eR', &(0x7f0000000800)=ANY=[@ANYRES32=0xee01, @ANYBLOB="e62725d97524ceb85863b7c4f8540fe0b4f0832f5bc5d4fc31300b88cfc1b239730a97060ab50a5542a78d6b51e07e8141e658baf63577a3e183901d010abded2004fb4e1385729efed97f9c33fe08655b2eea933e6637fbd1327b629f66f5c8", @ANYPTR, @ANYRES32, @ANYBLOB, @ANYBLOB="08000200d29cfee83d23a475b03e384fc393c1f8b1ed0ec0f93400000002e3bfbc927114fa14b49d837a9965cf1cf244a69d0fd6fcdce6084e654e5e4cc392d1b25c0da0bcc52ea4bd89b92660988dbb820af038b6d6d4f0d8acf2f4bad14740043303", @ANYRES32=r28, @ANYRES32, @ANYRESDEC=r30], 0x9, 0x0) r31 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r31) r32 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r32) r33 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r33) sendmsg$netlink(r2, &(0x7f0000003500)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x2028000}, 0xc, &(0x7f0000000280)=[{&(0x7f0000000440)={0x12e4, 0x3e, 0x200, 0x70bd2d, 0x25dfdbfc, "", [@generic="6ff5ebb1242e8ab8fc9b2ed83d280a3d395e0311872f6018c162284189cb2c97428d3ce24783a065691b2c1a8a8cff63368ab55dfa1bc3da24f67683d77940bd0b428c4abf42e1bdd55dd73a57b023fba92272ff55c5102fa40ddabc1dd7c7d771e9866e41ea4def6eb5b460d2be6af2f40dd675e89413a016476b00235323c1b0b65235cd011a6c3b19df6b20b373f7e71d0c2f5cc092502c05ed3c34debf6630f27084ea193b15e47d725e51812e93", @nested={0x10bc, 0x4d, [@typed={0x8, 0x7e, @pid=r3}, @generic="c87e2efe069854558a22d25125eef8dab434c4fff3650f9bf05d06138fe37706fadafff92a1093e14a042facffc74de61753496f362b6d992e3699ad5886c79ff3989e63702acee2f8e26b2ce8f7858cc060cf3d632af85981748472856ded32167516bbbca6e214ca3e7537202d2a18401754a9a32c731c96ea740e6198a48ba8f3451f2745fee0bb0b4b279f9b88612f14d76193ddc9f60ba7a0c16fbde410ea4d68dfacf7c19b204e0921862ed9f1ab6682311aab8b9af065c662f07d2016c796adcc2692a509223488adede7cc3d03b9f8d951a53b46984d5a79648c4f6f7eb7980814fcb4e166c7fe8acf5a031bf1e79daa31db9ed17b087fb7c73d525ed5414d2302dea2f3e43f4c192e43908e32a8001eda464d489e8bfba9a1fc09b0065aa59456dec789256cdd1c6ee2a23b1f664556b677fd876228ce3bef95ca023b7046e50e774804f9bcdd05704e9c7072e4d60c002b00426f346f8ebd8d3db9ec7ec1dda18145454c3fe49bb54be42ebeebaeea65a6cd7a3fef03f3f79fb4479d473fce866506fbadf910b1494cd18c7dfa0202634bbac086d46ab9f31e576830389223dc59479d3705a741778bb4b0a0a84616ab967eb17bc337f753d3ddab8a3c21dad7748196ad7c6ad2ec24b872618a1fac2bada56ab3cbf0369a26ce775b798ec196b9a5ad5d9256688b26c102a566d923c22389d685141df17a542cb0a33126c5aeb20a0ae4992ef81c1feb82588d43f63f10c6217f98bba951638b1bc3600b74c6dc9f69a48e0ec73b99fe9b1d64fa7f2b1d3a07282d7c1f50cfbe94631a848b0cd0abaab9ca631554ab6683787969a08e7d4f3c315d3dc830576264efa0e3dca454818a654186947cb568f2eeb07db543b11d35a25353737f2c52de09bde5d8fbf988177e6f9b03bb4586cc9be6b775f9f4ff343246a6683811ebc5241c5e722c322eb3a2f20053b179ab18c8ff76f54ed4b2c911bb782daf64bdcb25b66402bd8dab48f0f0fb58247eec1ec3dfe5c4074b911881218bcb6a91b06066a6aa46f12a8d6076fff290d22388fe8b33db219f60afb055fd53c6256f37ac4f0d46851b84bfaa248e35a4205445d816266340713a4cfa70abfc1e753c35b31805596a88e41ae8560745a9901ea18fd5bb3a5d19022338b6ff0772538a097c52b66d0e7cdffea1ce27b74b7a53ebaf7c01c4b666aaa226b339812a53a7093bc4c59d6b7f3070337b7e766c0cc0e6950cefbfbd23f29c1f1660ea279086666e4d9345d4940a3a42a28070c256226771454e149b4ff880eb3f4dab8a988547c23ce2ccc6ed41f8f8f1104b17b7d5825daafb285e9e2c759de81280bde0ef3397968adc17779319ff09f5572d7994937cb6d4a1c9a98a07ea37f4e4f3f8d9c5896602ad6c2a0d473e1192d3d5173c1d2e5b68a80d92acea1334e1b9e6af298bb8361e56b87ae6fde6b6fd3fcb51da1fd7549523f11b99363a6d5c858978fdffd01438003ab5f3d1f977da7de8432daf973d37b185182e4fceb4473ee0cf5e95fd09637cd016bfb080ca0d679298158daee32cda303205b683b5ec1832a0a6048ee1a2c7736870b587c0e1319e493f2962c808bcdc7c4552f0cb3727c8d097dca9f518648699c35c41ad242826c18f2184d3471270f2ce12626f1e9fc09214b7cb8bcad9206bfaa23ab5a363ff36ff09bf3ba5825a433c7e29562ed87c6f1a3971fe8dd8cdb31fb7dadf6ea6fd7348e1224714401fc895c8bc525c69d65acb739c3a9bac9cc232a1865ad3f79f387fa561701d78a76029427a85b8fb0ce60301424ab9dad53fc1608d0635346b605a4254b7ad14a48d2daf0ea22e2bee300fa5458eb897e07fc7e2262b69b5aa07641cc2affafc0786470b521b02a6e779f38d153de77ea3afa58ec5cda6d71004575d2130e4841b31c56f067e1ed48d02cfc1dcbc29b2f5b4f1afda12eb913886e67f1ab444e338adb56b2532bc00a6db7ff24167227345c1962ea8f811e0b8e67126b16530757e88bdfb1341b5977cb0cb0b743a41568e4ff16fe089276a1a147dc433cd508140ca0e21557337cdb6a63f3bce85d911018bb470f9a8cc9be43c55af4661be4afbc0503ecd3aca963783d9b72fb58ce9d42a03d86b3cc31fbff8c23cb8eb4e37fc94431de1d3055e90257f41e2433ce365e95822338ad1cfb2e16961ab3e73187801b45e489f86f2155a94f1d8df94c58c37a72cb804f95ca482c38b5b192f82416a87b11a1b105cad84cdee82c55d662715cd851de5eed7be239721e97de6f511509ab9c3a6878d863a8f109340879dfe022eac2503bdea256722a71672df1bcd8fea2c1d379874093686b79453b57e982b7fafe200afa543d48a16307919a78b731065e2ef36f2af177c6f3014e2008b3d383dc621a84730913e7aefa114718994057425cda2590bc1180ba5d594c3eab07f95e237a4d517f6d0a104d742b58e47dda43c30d0956b7c19ffa55ec644e4bf1c92ecf263f057c6a55d8b76c8fcdba23c65488adc83b1d4af8ec883c46ea2f7377dd284370494902f3f7d88c69727a267827862634d3ecc1bdb60391640cb98b88e3eb64684655e3cb639ed1fb48d2100637f156dcfb670f55fc5f7c6cc45730c0d0bed12af952d292f5e9f3d05c65157470bd5e0fbbec125da6ca258bc34d2b028bff8dbf2eee07ce4c741542b2a2bb13d4e542fab1a350c6735ce0ac09b9471115786ec427c6e5249678e50bc05e037d2cae4a6971e3762a05418f8bd573102d63289c747f607749e9f1499fe3250ad3ebbe4f5364aff531b36195309257b43e087105edbe0f14033c0e9b8cc719f1ba5c79e374bb096e81209264a87762576859c4d10897cdda3cb65d5d445cca2ba2fd3a189dfa123d21a97cccd574ccc121def6ff4f7972f99e25b19040539b0198df10952edabd4cbfdc55699c722dc12612a45fd488a947b613d1e8412001cd686c9084c7e083e166c6cc6d7f3df90f96ba042342dc879acae4b142ec3608890ede1114ca3d5156e0c729b83a3ef1e748ad2dca492dc2723d118dfbbd1bde830f9c846ebf04d82d255c35c06e063d158694147b0d32edec1688164514b2a22468c2c67e39ac64a5cd50ec4f577d2d26554b7b9bc64bbb6594b1e3b0d090df2ebc57dba174d81861708de26b2970060fcd34279ce1b9d6ca7698d1634209910a760181f85671266a8d486756851f8f04efda577447b1f3bad198b23cdd6fa878a5975d340c0a0f84cd3df47d65f8205e080507ce9b971df9dc2bbac3d56eb524137ea92c900b8b03b3eb8efdcefb5b846fbc496df69e37b76cfd5070c270e00814f91fbda68c4a39321c0036269d11daec3782cf8a444ad9ca1e335c2b3951bf641f57dc5e602780775310f83d1ba970663721815e1340554ec943932ab4656a1edec3529e35ff803830a2f1f876976776fb00fcb504f8a390b43e21194016335d77faf176743243e8660473196be3730527a3f1779c7f079ba754ccabcc9291a702997b47a26e091c5ee77f742dbbe1aabbe59ac052efe6adf493352dcc3b19e4b277125e850a9d3dc3898d6d0b50b21ffe7046101d564af0f63d6326e312fc219e24c0e62b381db013284e02507fc5ebde23c1a37c71497ebe8784508b030449c6545b233b9c4fad4db0eb663d12f33c847486da9f1f9e3fc2871bc4e8ed15e0d9afce18f00cc8d80f61f8e834c85861e9da2845746686ef9f694482f0b8c4c8164010c99c717c8336eb08d0f7fa838e6b0ea745d169c5b628e3615bc82d425f86dc406c1b5ff031a432e00558759b7cb32ea7db477db5940a18e4220a340fc4077fc8dd38f65f6a5d11ad6f024faced519b4dddfe0f0d2899b8e0a911f4f241263c6e3ed8e36fcec55f8f0b9db3db4ec4dce2991a24ab1a9a4a948b52b0cb8e3f1a94afa8800532e3b4f13b5ae1c1be092d84553c71112544189e401f2fc974e67ca9e284b3239bed4594e044097837ad29eb0c9190ccdf93d408ded17f2c2dc77fa899cbdde1d75129a104569ad03861533604f9f602d88ea102f4f73798f4be8ccb080109ace6a7191c3b53fddcf0385de7701caade619a3c3f5890bd7defbf1dd62244f923b4e40ccf4cb35eb0d9dfd4dbb7d7865d983e0ac077962c1df23797aea2d0d51da13526b25ca75c8d0e98e4c2dea3c2ccfd8214f560f5508a849c70d5342570bfc194404f7133d5103746d6fa1d2812b07d9db94cd6c0b1b3bc452df9be058e86604991e60c52925b2962a79a717f2e322912587a437107c2aa02176b18989a5cdbbd9c430b22ba37b68f2bdfa9984c10b97114de41519e3f39b90a93f88770598729c7220a338224f118e7f446619c5ecae0a9e16172e5a08ad118719d7aaaad2bb70348268ac319d81352300b89a28be66a86577d4f707f82bf83a1cb1f9733d6520c0e0e55a9578764f49ce86e4c0a93240a4fff5e402f7b14f93412b83a6ae189d83e9fd866994c0370c142a39e77e24c785d4a4fb798772e3b08175417339b5919610d8a8968a276ce723dc26f14d03850fbab49cd3d66be670db2db7caacc5f8b0d2a394db2645eb4b6499aac604f2ae8d3402a08ad36876790969e9495f768968a44d144402ecaec73db17cb34bf53aaedbe39a4e1d1f5b313a5d17f5fd65bf26dc2b90c8485d8b9f2b2864e3e66f4a1be5d3f327e3f3657f9089fe7a67dcb1e73d0810e8b90d4f6e8920794a8e3301a7043ff25c34b2d8716cd29c16b142a7fb58f155e247557b3b19bb215b547764b9e9ae7564158f2a7f1d88b8ee56f9b6bc1b26f013e78b033d8ee3c20bc87eef04c1d2e1f2e4df41ee721ab81e7e7e8b8ea8408c687cc950005d5b37509fec582b7100ef48450bbbc1a8d209565c91bed8cb3d52ff009da644ff21d66efb23c5c0e6845238e172f31c673476f45bbf9548c4f9926bd75b495e71a6db9ee34f89ed39dd7a72d618234e70b42be61544bea25969eead27d1b632f682cec3cc3f2291e2060ff3677b6699f44b0357c79e60607851ab6a38ac6b881c7789e6ce1eb51536323439110f6bdee1833360fd2a74412f2225f79c5163065212b4065442717f5349244bac0cedea4ee208df4e2752616c2d65a4f35f2c80895fb5bfa7d7c94b32686e808368cc2cc4a261ef172e3b946c1551f0cc074c2518a249c38567479ad1340ae4ae783443c606e95b7e65f10fa7f9f53104725f85558cdfa5cd891da2a6d69b95158d516ad807060a0b1020db931d328dca7b2fbb7942fac7bd05f636acc2454a2af8d8c2f5f99413d41be4a6a54119caae31bcc1a34bf420279c63953da9fb891d27ee8b89f54c8ab681d272ebc0470e330e243879aa9ba90addca934754e2761f0a8137a738f508785ed633698a9c991ad3628a751a3d515b4cad1b15142481d51e1c47b6d44135acc6cf87b8cb0d5a7ffd5ad0788b493752abb7a844cfadf85f13cb6c703c5c137cdeab15cc678d27385bd32b9ccb9554d489d52e45077c83c44e9166dea055b22566fda677c231b6dd0e08f7542886475e61492168603d35e43287ddae171db0a0364e84a3e11cc3f1fde6be634050778f7f0cf54f9a562ae3dde4cb58f2a290e775847594fbb8e2ea91c86a25f9625a8170ca0a8a0982471df5fa4d43323150c174c2115c9dd62dd52d3666a6b8055d92c420a5798733feaaf0202fdb5c6a739eb32b0cd5ca1277536d284ce6c046ec760fac4372da098d1aefd0cc0a8201f83bc9b595d09954e313c54e80587ea7f02c3e1ebcb7bcc27e0c0ef0cabfeb0f9910f095", @generic="80fcdd1f7c8eee9172258435b40965333de372a24ccb85a3725f7c114e1112327dd5c91646c1ee3eff28539f6f8d1bdc5bf5a39ff4c8769f235df235ea4e7ff071b52f30d7adde678723d1db7c34d8abfc42c649ede97a88898372d3a279438d57d9864738d9ef621e71f311b6a2cdc82dc9d0dfe834a06c209e9ee1e17923b43e498a105d6d2b0db14968b1c1b6de027b3c4bb6bd8d0d87e87988bd05371fdbfa4f4e6a1a13ef", @typed={0x8, 0x42, @u32=0x1}]}, @generic="1383c283d4c79f6eb83771097675bbbb0138fcbb55d1e2715f2805a4d70053edcb51fd96eb4060a468d30849aa4a0f0449befe31ff615816e37edcec88447aed917c0c10e4c4fdd18671afc8d09416b30b37357486d31b10319d23ccab05843a1c28a757a89fc9ac4171f297dac575214d7c3c46a49565f5a99cdf4a4eeef9e447788729d2d918b87576c9052969e3b3", @nested={0xd8, 0x1d, [@generic="4c778e821f9d33eaa16235ffe6067b40211a6575c4bfdc2f2a7be649f185b6ed51b3a8154b769b509f27830a5bef6624a40a840036c0f527740f2680a03703981b773c0e81c0d7b0665838790fb9594a53ae12b594cf47dad2de6d975c11de81d647c82b0d3d97ed078cb375632a73818bc9d43dbc07a202cf792462f5999c1556d5ce675d4ce9ad8131e9cd9b544ab9cd0ffdfab6474cc2c8a07549e3ec85c80396ee7c41550a33c0435cff2e43b9ac12522ffc7f4b24402cb65d4c31cf3162cff7acf08027a9ea61805c9d2e87840a4c1892"]}]}, 0x12e4}, {&(0x7f0000001740)={0x340, 0x1c, 0x20, 0x70bd27, 0x25dfdbfe, "", [@nested={0x31c, 0x93, [@generic="95da368184bacfe855f34c006f3f1165a7e3a04f6750da6620f44522699eaac8683dca791e8deca009e7233ced7d3b8d19c6c64ecd3313a2e71574c93abf2c435f65509205196c80232393b22a11c28f17f255673370c955a396a492b22c9a31e4765280a3373d289a3e17421a7d4c22fbee369725baaf372b497f31a8a3a95a7ba32cfa5269c06940", @typed={0xc, 0x5e, @u64=0x5}, @typed={0x8, 0x70, @str='\x00'}, @generic="9f01775a1d85e330d009c7ffc05143323aefe316867b73f70d12425489c280b3e8c41d0fbfbf10020ea715f456cc0469413ad845b367f2b924653f3363cdfd568d29e24c6b7f911c25282394fbbfe2a542a50b0d74e9913518ba4453358b1239b4a9eb734594fe1de1849b6ae35b1c4ce64a554ee59c612a8275f5122d75d880c41b12565ea13c1cec79113d7374a9aebc10f95261c1576360839212a182c363a6991b210d862f8dfbf20d9944fbd5dc1a982f834f3413a23d527b112633893929b3abfe4b7441c98f3315619917ebf193a1bd9db2ed5a", @typed={0x18, 0x74, @str='posix_acl_access\x00'}, @typed={0x4, 0x71, @binary}, @typed={0x14, 0x22, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="f1581af3a8b11fa6a222f3af8910b1542a0ba3e834961d6221b31037ab4193b90ae4159ff6caededf335738df24c7bc7b304dd2039564b65a07e9710a6ac11b3dc67a5962900ff2148105a39e04622c7dedeedc999dedeab686e453cfa8ab53e9b68d9fea15264cecbe5c7fc1b70c4e0225d0d3bf9b6142a4daeb542013f66c40b14e3f552b05bfd5c8b1034a51c29c8ce5540142cb745ae050f7f74", @generic="dbdfa9516008405b5b80c6d564c28eae5ba345a2d8972f1f315761d46817d8438114117d63e1b809d3d9a1798e111e3fba63332dddddc9d6e16410208d5da69a109608c3a8247e5bd9cf7257fd7b4bdaf86b1f8ffd13861906fe0f6a0bdd11e434b37d94dd2321ba9277d74707785368272ea385b4248c277226455a30d8244fc9964588ef0a2f8553fa476dc06ed78b12eab388bef9716d19e7459f33f732aad66d38e825bd12f78b884df15b1182c5b96876d6dda61649d7c14987b55665295297e7a5ed8aeb2211e657515bc275fdac4caeab2e8863d2"]}, @nested={0x14, 0x28, [@typed={0x8, 0x68, @uid=r6}, @typed={0x8, 0x1a, @u32=0x1fffe0}]}]}, 0x340}, {&(0x7f0000000200)={0x18, 0x1e, 0x51c, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x94, @u32=0x2}]}, 0x18}, {&(0x7f0000001a80)=ANY=[@ANYBLOB="cc17000035000800fedbdf2508006300", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="08007000ac14140a0010005800257070703173797374656d00"], 0x17cc}], 0x4, &(0x7f0000003440)=[@rights={{0x38, 0x1, 0x1, [r14, 0xffffffffffffffff, r15, r16, r17, r18, r19, r20, r21, r22]}}, @rights={{0x1c, 0x1, 0x1, [r23, r24, r26]}}, @cred={{0x1c, 0x1, 0x2, {r0, r27, r28}}}, @rights={{0x1c, 0x1, 0x1, [r31, r32, r33]}}], 0x98, 0x8000}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:12 executing program 5: r0 = creat(0x0, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000880)) connect$inet(0xffffffffffffffff, &(0x7f0000000940)={0x2, 0x4e22, @remote}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f00000008c0)={@local, @rand_addr, @multicast2}, &(0x7f0000000000)=0xfffffffffffffdbc) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x28008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fd) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fd) write$FUSE_INTERRUPT(r3, &(0x7f0000000300)={0x10, 0x0, 0x6}, 0x10) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x11, r3, 0x9) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0xe25ba000) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400203) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000001c0)=""/55, 0x37, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) r5 = socket(0x10, 0x802, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0) pipe(0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) socket$inet(0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) clone(0x5a208200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() 03:55:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000200)={0x5b7, 0x401}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000840)="416aca7eb2684e5bf5a4944e374d4bd9419f0f5885f8ffe8da24c5e5d39da60aa7de5571111d6566ad9cfd676b9909000000802ee29de77922759f74684f0f1962bd2c560ab8e70908", 0x321}], 0x1, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)=0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r5, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="04000000000001007a0a"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000028199b5400000000d9086d45605cb6ecd13a64dddf0be0c8a9385dfcdacc64d21e1f860626fbdeb8c6652bbf2eb51730", @ANYRESDEC=0x0, @ANYBLOB='.\x00']) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940), 0x800008, &(0x7f0000000d80)=ANY=[]) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r11}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r12 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r12) r13 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r13) r14 = syz_open_dev$evdev(&(0x7f0000000000)='/dv/inqut/event#\x00', 0x3f, 0x0) close(r14) r15 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x21, 0x0) close(r15) r16 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r16) r17 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r17) r18 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r18) r19 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r19) r20 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r20) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES16=r7, @ANYRESHEX, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRESHEX=r15, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000700)=ANY=[@ANYRES32=r17, @ANYRES32, @ANYBLOB="a662305fe807a81be3905fe72f3d4ff1d3c9da98ac7d2e2200468a91ffae180e34196805796ced412603d9fe387a942e7f0d4126a619cfe69b915cd05fe92719badba3a7fbff", @ANYPTR64, @ANYPTR64, @ANYBLOB="5268e1a73cb1da166ff4bf47c75a53d972fab3dbbe3ff220a97c2711726307700d22f63bedf96621b00b75227a4ef151205a435ec5f2923f1ab7141663ff5e5e295972864adf91f47370a1d186eb91269ca38cd1a21775374421aae7de83000205aad8a382ba1ad2628d3f15fc403fcc0260342d323a06d1487708d2b9edf1daef71f99d4aeadb60eb38ec87309ba3cf8a1412005b188fdebbe24ce631ddfdbe7d123bdd23ff3e56607fffc3a157354bb0f0760903ca72d3a9840d", @ANYRES32, @ANYRES16=r18, @ANYRES32=0x0, @ANYRES16=r19], @ANYRESHEX=r4, @ANYRES16, @ANYRES32=r20, @ANYBLOB="93ffa469974b1ea8ef79535fb0a5b9faa5f7a2d3304945e6a118c7d148858b090bcd39476de814fbec9ef361c6e7d73a4fc120918251d28099188eec7126224411260273920bc0d59baaa6b79ac96ba8acb0ebb0", @ANYRESOCT, @ANYPTR], @ANYRES64=r6, @ANYPTR64, @ANYRESHEX=r10, @ANYRESDEC, @ANYPTR64], @ANYRESHEX=r16], @ANYPTR64, @ANYRES32=r14, @ANYRES32=r10]], 0xfffffffffffffcdd) r21 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r21, 0x3, 0x0, 0x8020003) writev(r21, &(0x7f0000000380)=[{0x0}], 0x1) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0xba, @remote, 0x120}, 0x1c) 03:55:12 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x32008410}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1a4, 0x0, 0xbc4547033fac5fe7, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x47}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3e7c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x43cd1a6d}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1b6d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3bf}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe98}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x282}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x20009024}, 0x4000004) tkill(r0, 0x3b) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000004c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000500)={0x0, @multicast1, @dev}, &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}, 0x4e21, 0x1c, 0x4e21, 0xbe, 0x2, 0x70, 0x20, 0x3a, r4, r5}, {0x400, 0x100, 0x1, 0x7fff, 0x40, 0x9, 0x7, 0x5c}, {0x4, 0x9, 0xa2b8, 0x3}, 0x2, 0x6e6bb7, 0x0, 0x1, 0x3, 0x2}, {{@in6=@loopback, 0x4d2}, 0x2, @in=@empty, 0x3504, 0x0, 0x2, 0x0, 0x5, 0x8, 0x4}}, 0xe8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:13 executing program 0: keyctl$update(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2008002) setreuid(0x0, 0x0) getgid() write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) r4 = geteuid() setreuid(r4, 0x0) getgid() getgroups(0x1, &(0x7f0000000140)=[0x0]) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0) r5 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000400)='user\x00', 0x0, &(0x7f0000000440)="4a62a1d429da1f49a68cca8b207affec88e9b2445e440a43ba1feb1ea22c1cbb8192d3717f334b590e3b8e4f1b76289c0200000000000000fa77a75262c1ac0671792954276879725d90af6d61e64524ffc63c0417bcfd05b5479472f7c63455c6c5ab5b728e5f488f762ad4ea1de778e882aa4968a3d0a6e1c0020559769b29e2d15ac4a85c641c594db6f1d063bb4a0300000000000000e949c3532fae7c24d99412e8b874279dc8", 0xa9, r5) sendfile(r0, r2, 0x0, 0x200fff) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TInC\x00') r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x88, r6, 0x4, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1a}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x13c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0xffff) 03:55:13 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x50600, 0x0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e22, @empty}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322c91bc151de8e00000100004c117eb6009b3d81748d52863e9cc1ba147c19"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1709.719383] audit: type=1400 audit(2000001314.043:1603): avc: denied { create } for pid=12799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1709.801469] audit: type=1400 audit(2000001314.113:1604): avc: denied { create } for pid=12799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1709.983039] audit: type=1400 audit(2000001314.303:1605): avc: denied { create } for pid=12799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1710.029530] audit: type=1400 audit(2000001314.353:1606): avc: denied { create } for pid=12799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:15 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:15 executing program 0: setrlimit(0x1000000000000007, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "174237888e09e993", "6947240f4e37c8e73e6147ba1ffd5060", "31211c1a", "90f8c19d0f3b7ff8"}, 0x28) socket$inet6(0xa, 0x2, 0x0) 03:55:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) getsockopt(r0, 0x80000000, 0x80000000, &(0x7f0000000000)=""/112, &(0x7f0000000080)=0x70) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) ioctl$TIOCSBRK(r2, 0x5427) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) setpgid(r4, r5) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000180)={@rand_addr="ab816d210fc444a24e4d26bb557aad72", 0x4b, r8}) sendmsg$nl_xfrm(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=ANY=[@ANYBLOB="50000000210001000000000000000000ffffffff000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00575ec6ab4d822e"], 0x50}}, 0x0) 03:55:15 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setregset(0x4205, r3, 0x2, &(0x7f00000002c0)={&(0x7f0000000240)="f0836b600a529e1f95fc060dc8747bce5f934c00f127d6d798afa1a57bc9dc01d02e524f740a5f9b80dba09134df11fc054a0664ab525b78bb5c1834a1b0e7ab191db1ff8de4a6470aadd57e585a291e976c25c3", 0x54}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:15 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$getown(r0, 0x9) writev(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='timers\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0)="ac0fe3baf36d335cccaa8b52fad7fbd101d9939a0480d3a46163b70ffab71b03d4908dd1b1d8169164a46016a44ecbe2615f540d8ff088fec5c617ced72c28b78626a9c8dec7546d2cac08cb2997fab100a4cad17bd0101f60250d8d5599bb0f1cd3be3f20b8bf7055350962018ee0ae0fec47b84d306b33897acfb6ff19377983dcb7be8d5bacab03d82026a8a0a29124c3c97c64940b9254dc143c77c7308bc078c2804809fec12f671203", &(0x7f0000000340)=""/217, 0x4}, 0x20) syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) 03:55:16 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}, 0x1, 0x0, 0x0, 0x4}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[], 0x0, 0x6b, 0xfffffffffffffe91}, 0x20) tkill(r0, 0x3b) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000200)=0x2, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000180), &(0x7f0000000340)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x8b1b5d2f3ead6cf1, 0x10000, 0x1, 0x0, 0xd046, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}}, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f00000001c0)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="7555274e12d25d0d8692a1eb8677d7f779e434c12eae5ede1fe653626c80ef", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getgroups(0x2, &(0x7f0000000500)=[0x0, 0xee00]) r7 = getgid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=']f']) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, &(0x7f0000000740)='fuseblk\x00', 0x654f6c76512f7fa9, &(0x7f00000008c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[], [{@appraise_type='appraise_type=imasig'}]}}) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="0200040000000000000000", @ANYRES32=r2, @ANYBLOB="02000600", @ANYRES32=0xee00, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="040002000000000008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\b\x00', @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="10000100000000002000040000000000"], 0x64, 0x5863fd3d4ad2d7af) connect(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r12, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"/319], 0x13f}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000100)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="04e037b30ec9d880a38fb378b2e6309ad8b0f1b27f21e1723662702dd8b6550c5a21e666abef4dbbee5c239f214e2e53ca26c5fe2f2e82afd61e18d88f99444ce8c7bc8dbdecbcbf9ebbda6cdfd614d13a0d71e9acedf863dc7313a1e8b035070f4f5eb5dc3d002e41e549a0b4", &(0x7f0000000280)=""/164}, 0x20) ioctl$sock_inet_SIOCGIFNETMASK(r12, 0x891b, &(0x7f00000001c0)={'veth1_to_bond\x00', {0x2, 0x4e24, @multicast2}}) 03:55:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r0) readahead(r0, 0x80, 0x100000000) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 03:55:19 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:19 executing program 0: getpid() socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040)={0x9c2, 0x0, 0x5, 0xfffffff9, 0x9}, 0x14) r4 = socket$packet(0x11, 0x2, 0x300) r5 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) ioctl$RTC_ALM_SET(r5, 0x40247007, &(0x7f0000000000)={0x16, 0x16, 0x8, 0x8, 0xa, 0x7fffffff, 0x5, 0xdc}) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x200}, 0x1c) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4000000000002dd, 0x0) 03:55:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)="61ce0aa8f6809918da77063d74325e5a4d206c9dff1f451b3e70078f", 0x1c}, {&(0x7f0000000040)}, {&(0x7f0000000080)="86d430723c299db4f02ef0ae082d2be242dfb7f901b4fb59d5778ced815e00c0d43e02cf8eaea82c9b05bdef3ce947115ffc2e613a4e230f17e84dd5f9974c5e70471023e2ea756573502102d3ae9e36d2fa731508552f9a31984923c1edc64ada5899ac5a01e08f54999326a954c8451a58bd487c3ef7e7154234ed", 0x7c}, {&(0x7f0000000200)="2467d057ba2501c9cd065b52c6c99baa43a5db517787f20abf70c89003dd2ed9427bc084875cae1ccb93b9867baecdcd3a3a789920f0ab0d34a61c13e16c130ef56e2539ee877be9d59aca119fd14d41977924d5722a1047e433bffba894a10b3d244a35f8bde447cd0c40e862f17784e514f6d3b2f069bc4307598e5052d18e44c6c18e07d6e96088e7d4483210140f0bfced3d27dc", 0x96}, {&(0x7f0000000140)="b87f7aa41d0d2265e10f64f3ec4d772d4b67dd221b9c8101ecfe481601ecbe183408981b39da226583c4f2e8ffb2e0922e09bdf1", 0x34}], 0x5, 0x3) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000340)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x6, @local}, 0x68, {0x2, 0x4e23, @loopback}, 'ip6gretap0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x18540, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000440)=r5) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 03:55:19 executing program 5: r0 = memfd_create(0x0, 0x4) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10d) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r3, &(0x7f0000000240)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80400001}, 0x14) shutdown(r3, 0x1) r4 = accept4$inet(r3, &(0x7f0000000480)={0x2, 0x0, @empty}, &(0x7f00000004c0)=0x10, 0x1000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), 0x0) dup3(r1, r0, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) creat(&(0x7f0000000100)='./file0\x00', 0x0) r5 = socket$inet6(0xa, 0x6, 0x1) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xfc, 0x46182) r7 = memfd_create(&(0x7f0000000100)='\x00', 0x2) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r6, r6, 0x0, 0x24000000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) close(r6) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7000008, 0x110, r8, 0x3fc56000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f0000000180)) 03:55:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:19 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x5, 0x6, 0x0, 0x0, 0x0, {0x0, 0x9}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES16=r0], 0x0, 0xa}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) r8 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r8, &(0x7f0000000100)=ANY=[@ANYBLOB="cefb666eb9f08980903eeed47bc8797483e3b75dbcb6e29bc30f778c7393e17f3b8d3559e8a12da725ae9bd6d1eef930319a6cb9e6d3fe8b861851e205eb5f893176914be7d591d2eff5f82f445ea54fbd16003c8d"], 0x0) fallocate(r8, 0x3, 0x0, 0x8020003) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f0000000340)=""/94) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 1715.637312] audit: type=1400 audit(2000001319.963:1607): avc: denied { associate } for pid=12914 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:55:20 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1716.363376] audit: type=1400 audit(2000001320.683:1608): avc: denied { associate } for pid=12914 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:55:22 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:22 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = dup(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4104060}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffff8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x83f38cc44489b56d}, 0x4044045) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xa4, r3, 0x70be672e2d2d754d, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xcef4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4081}, 0x20000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x0, 0x352, 0xfffffffffffffdf8}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) r8 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r8, &(0x7f0000000100)=ANY=[@ANYBLOB="cefb666eb9f08980903eeed47bc8797483e3b75dbcb6e29bc30f778c7393e17f3b8d3559e8a12da725ae9bd6d1eef930319a6cb9e6d3fe8b861851e205eb5f893176914be7d591d2eff5f82f445ea54fbd16003c8d"], 0x0) fallocate(r8, 0x3, 0x0, 0x8020003) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f0000000340)=""/94) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 03:55:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1718.241177] audit: type=1400 audit(2000001322.563:1609): avc: denied { create } for pid=12969 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1718.287061] audit: type=1400 audit(2000001322.613:1610): avc: denied { create } for pid=12969 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0) r8 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r8, &(0x7f0000000100)=ANY=[@ANYBLOB="cefb666eb9f08980903eeed47bc8797483e3b75dbcb6e29bc30f778c7393e17f3b8d3559e8a12da725ae9bd6d1eef930319a6cb9e6d3fe8b861851e205eb5f893176914be7d591d2eff5f82f445ea54fbd16003c8d"], 0x0) fallocate(r8, 0x3, 0x0, 0x8020003) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f0000000340)=""/94) syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 03:55:22 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000240)={0x0, 0x40, 0x0, {}, {}, @period={0x5c, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x1) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:23 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x7c, 0x0, 0x0, 0x0, 0x1d7}}], 0x1, 0x20101, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8, 0x58d2}, 0x0) ioprio_get$pid(0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x9d106, 0x0) ptrace$pokeuser(0x6, r0, 0x4, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt(r5, 0x4, 0x5, &(0x7f00000002c0)="76e3d1c3e6fab996eb2f80ff6872fd2de02f978b07645d5fe584c074df086dd99a23c90cafaff6bef8f2ed3f75f4a34086b94a6629a9061f459db8bc1867edff7b46d846728e05ae9b56379ac0de1bea5c9d7cb6bd2c6e9aeb46acc3b10381be955a7627712588f08512b7317a73639dcf827e9c20311faf049c0176b6121d58323da7b20064aa90252bf8dd0fa3610b2f7fb93c761f51c9080852897323544b550a7282785c4f6b02a0c8b0fbb02b90c6799b8a637899ae588a7e9a99c882d23609259521e4ce249a942ee3b66cdf4bb4bf40bde68bc4981b45726e2ecf58b56f75e454d98ff266839cb3f5ab73cac5052f1c447952c7", 0xf7) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x4}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) getpgid(r6) pipe(0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x4) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r8, 0x0) 03:55:23 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:26 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:26 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:26 executing program 0: fchdir(0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) sendfile(r1, r2, 0x0, 0xa5cc554) r3 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0xffd) 03:55:26 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="61fa7452"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1b3457de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f00000003c0)=0x0) fcntl$setown(r1, 0x8, r8) lchown(&(0x7f0000000180)='./file0\x00', r5, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) setresuid(r2, r5, r9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f00000001c0)=0x0) ioprio_set$pid(0x4, r11, 0x9e5b) 03:55:26 executing program 5: memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = getpid() r3 = open(0x0, 0x204400, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7, 0x0, 0x5, 0x1, 0x0, 0x0, 0x32296cd02e16564c, 0x5c4b3ac4c1e96017, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x20000, 0x10000, 0x3, 0x9, 0x4, 0x6, 0x9}, r2, 0x10, r3, 0x50e1930d0b8b5f5f) write$P9_RRENAMEAT(r0, &(0x7f0000000280)={0x212}, 0xfdf6) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$P9_RRENAMEAT(r4, &(0x7f0000000280)={0x212}, 0xfdf6) sendfile(r4, r5, 0x0, 0x7fffffff) readv(0xffffffffffffffff, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000280)={0x212}, 0xfdf6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x7fffffff) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$P9_RRENAMEAT(r7, &(0x7f0000000280)={0x212}, 0xfdf6) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) close(0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x84003ff) 03:55:26 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc1fe549fdbeea85ed43f8351de8e000002be1c4150"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:26 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:27 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="0b000000000000008e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)) prctl$PR_SET_UNALIGN(0x6, 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) getresgid(0x0, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x3, 0x0, 0x9, 0x0, 0x1, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x62}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x2, 0x70bd29, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}}, 0x8084) 03:55:27 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0x0, 0xffff, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x8e18) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r0, 0x3, 0x9ffc, 0x8003) fallocate(r0, 0x3, 0x5e89, 0xfff9) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="bbb9e8e94cb9e882eb84e8474f6eeef87f6601ee260e4be7a9877f", 0x1b}, {&(0x7f0000000100)="b872a9175ab1e1d4d8a729fe40054d352d4bcd5d105ffd2641eb6fd6c177635fb7d7103972e43b771b2dff319a5359512a5cb51cc5c2054bb6aef7dfb0effb5bbfa64b52495b16d92c737d881d0482e94e9b1f04a241d3c9786bf3d8550e703f8739714848fb", 0x66}, {&(0x7f0000000180)="288900ff981bccec82e332a50d9f416ce2d50f613ac02b0932ffa0aaa98263ed6ee2", 0x22}, {&(0x7f00000001c0)="521dddde16095b18e36ce7db7ba2a7ac8ab359413c2dfa0eea01", 0x1a}], 0x4) r4 = geteuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', r4, r5, 0x800) INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 03:55:29 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:29 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000600), &(0x7f0000000680)=0x68) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./control\x00', 0xa, 0x2) r5 = gettid() fcntl$setown(r0, 0x8, r5) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r7, 0x200004) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000080)={'team0\x00'}) r8 = dup(r6) lremovexattr(&(0x7f0000000000)='./control\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="6f73d77740e00f16ffffffff0000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa6000de3) r9 = open(&(0x7f00000001c0)='./control\x00', 0xcbf855eac73b1831, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) r12 = geteuid() mount$fuse(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='fuse\x00', 0xcacfdb5d7b5f23fc, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=000000000000120000,user_id=\x00\x00\x00\x00\x00', @ANYRESDEC=r10, @ANYBLOB=',group_id=', @ANYRESDEC=r11, @ANYBLOB=',default_permissions,default_permissions,pcr=00000000000000000003,defcontext=staff_u,euid>', @ANYRESDEC=r12, @ANYBLOB=',\x00']) 03:55:29 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) fcntl$setown(r1, 0x8, r2) 03:55:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:29 executing program 0: r0 = socket(0x0, 0x0, 0x20) mkdir(0x0, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) creat(&(0x7f00000002c0)='./file0\x00', 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x88002) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000300)={0x5, 0x40, 0x1, 0x9, 0x2}, 0x14) socket$inet6(0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x1, 0x800, 0x10001}) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000140)=0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) personality(0x4100001) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000240)) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) getdents64(0xffffffffffffffff, 0x0, 0x0) 03:55:29 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c6300"/81, @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:29 executing program 5: 03:55:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) INIT: Id "5" respawning too fast: disabled for 5 minutes 03:55:30 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x7ff, 0xfff) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:30 executing program 5: [ 1725.954627] audit: type=1400 audit(2000001330.273:1611): avc: denied { associate } for pid=13119 comm="syz-executor.0" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:55:32 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:32 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x8, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:32 executing program 5: 03:55:32 executing program 0: 03:55:32 executing program 5: 03:55:32 executing program 0: 03:55:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:32 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2000}, 0x4, &(0x7f0000000200)=[0x6, 0xc941, 0x8, 0x9]}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 03:55:35 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:35 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fsync(r0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x400c005}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0xfb, 0x23, 0x0, 0x0, "81c10e5846ec81a63a1810ada20d18d4", "a511fd31eda6d831819f4a331783"}, 0x23, 0x2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='-', 0x1, r1) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='-', 0x1, r3) keyctl$unlink(0x9, r2, r3) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:55:35 executing program 0: r0 = socket(0x0, 0x0, 0x20) mkdir(0x0, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x899, 0xd, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) creat(&(0x7f00000002c0)='./file0\x00', 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') r1 = socket$inet6(0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x88002) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000300)={0x5, 0x40, 0x1, 0x9, 0x2}, 0x14) socket$inet6(0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x1, 0x800, 0x10001}) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000140)=0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) personality(0x4100001) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000240)) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) getdents64(0xffffffffffffffff, 0x0, 0x0) 03:55:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:35 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x600c0}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=@deltclass={0xa4, 0x29, 0x800, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x6}, {0x6, 0xffff}, {0x5, 0xf}}, [@tclass_kind_options=@c_ingress={0xc, 0x1, 'ingress\x00'}, @TCA_RATE={0x8, 0x5, {0xc2, 0x3}}, @TCA_RATE={0x8, 0x5, {0x2, 0x4}}, @TCA_RATE={0x8, 0x5, {0x8, 0x3f}}, @tclass_kind_options=@c_tbf={0x8, 0x1, 'tbf\x00'}, @TCA_RATE={0x8, 0x5, {0x80, 0xf3}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x40, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0x9, 0x16}}, @TCA_ATM_EXCESS={0x8, 0x4, {0xd, 0xfff1}}, @TCA_ATM_EXCESS={0x8, 0x4, {0x5, 0xb}}, @TCA_ATM_FD={0x8, 0x1, r2}, @TCA_ATM_HDR={0x14, 0x3, "eef3bbd4e9df860f1e408be804843675"}, @TCA_ATM_EXCESS={0x8, 0x4, {0xfff2, 0xa}}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x810) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d0200000086"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clone(0x48000000, &(0x7f00000001c0)="bef57f52f09ca823", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="1678bd8161687f000460a0faba9c796b4c89705e87145e4e857d2eb0d04f88d894034ccb1f87d5604130d8167321a9f7fb0621f438af131d72be01818e44cfd96ce06a75c2a425cdc327b05df2551721448c50dda053e6402f29c6c8eb9065050af1f51a4050da3b9eda24bd278ff89c66f46743b8ec008ec0edfd7a0745763d997fa1bde76ec14064956878c9987e369a90870a913e7c855d4e077ce1fca06f243158628b37c6940d37a5baae6fc8bb0da13b540142ec4c38c289a734ddd642b813e11727d95437fea874b7ea86ef8741a3be7f1591087dece4ae5ac490c3478d54c8c4febab0fb90e3d180") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:36 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:36 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[]}}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x2c}, 0x20) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:37 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x4000, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000200)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r5, &(0x7f0000003b00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f00000003c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000002a40)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback, r7}}}], 0x28}}], 0x2, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, r4, 0x20, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x44d5dd39ceab7a35) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x6000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x800000bf) 03:55:37 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1733.918374] audit: type=1400 audit(2000001338.243:1612): avc: denied { create } for pid=13388 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:39 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:39 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:39 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x313) 03:55:39 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f00000001c0)={{0x1, 0x0, @identifier="ff283006793a5b1c64d6dd40f05bdab3"}}) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x194, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) r3 = socket$key(0xf, 0x3, 0x2) getpeername(r3, 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r3, 0x0}]) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x40, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="100000007877115baca30eca7b97020046f3e01f0ebab2c0f5829695cfae09da080000000000000052b8f01cbc804e010e11473b7265a46167f114924e04afda13aefecdde16e6ae4524b95bfa9ce1141b06ae8db2339889728c6956d3664691ca5e0ed9b706a410c29e9c695500000000000000000000000fea5286623e35f5680c3be50af61f8821bbb687ba49af7f33d2053632cc1184b9e535517b1a367a5ab8477a6a6c32a23674b006d0bf3db38066ded9a9e7179f5201b6435ccbd29165cb208817acc26b3caae2fe4aac091d4eb9b9732b4d3804072b154be368b7ab67ece8bdf252ea89290f8b10ebe41add4d93e101853e0b5f28a6c8e31a43c1a01c3c4ad600e119b8a39c3ef9ff4008ae3bc1d0827af03b9ae878ae89bd644336bbbe1918bcc6d072c7612a83fa9b0bb87bc5be745a0bfae8fd8b63828b6038fd7c63734e23fc550c987a2323a9805ecc970d5dd70e7d523e074339a455ee64d344c84365859f8f51f3737a4b67f37924d735632f03be9c41e7fcb4b1c0c8c852909440b96d42be6cce9f0c5f50bc77a55048b51f8e2f9ef55e370b352af3c1cff74768a3f5ee8e844350c3abc70537795c98a3c857cab461d57686763ea799b458cf27ae239f152d7a8ee3"], 0x90) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r6, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x10200, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETX(r7, 0x5432, &(0x7f00000002c0)) syz_open_procfs(0x0, &(0x7f0000000440)='t/arp\x00y\xfb\x9b\x8cA\xa8\xb1b~5\x88\xc5N\x1f%[6\x95\xa8\xebd\x8a\xbd\x14\xaf\xd9Ogm\xdeY\x81\xac{Bb7@h\x03C5\xef>Jl.\xa1X\xadf\xc5\xbe\xba\xab\r\x00\x00\x9b&\xbd\xc5\xe7mB\xaa\xb6C\x8c\x06\x03\xca\xfb') keyctl$set_reqkey_keyring(0xe, 0x2) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e25, 0xba, @remote, 0x120}, 0x1c) socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x800, 0x3f) 03:55:39 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3a7bcd419a8c763f276f0668c2c59a7a788dc573d0f27f1dc85d1ed7681decfe0ec58900100000000000004bc7b58da840c677a0d0001e61e53e5710ef1916f89d0158bfe9cdbe3848a210846e74e394f173cdda23fc9e8049de25b0f9bb60d8c1b82343c0b89c87f72eb391b88b27c8fb3eec49e4e9e452f308dc69dc3b119d3b30a4ce8e9d212eb0cb9c97798b8f175f4e810d99c9576819f04d9561ffb376db78dca67f149e86b97d60ca1ffce751c2fcc53a4a16fd76a7d135243f477e41fa841b4df305790fe34dcd7552c6afbc68e77422523076598a75b089a7169853eb3e406f7ff25d12ed2b101f1ac5c298acf08efb6f0cef0ee34ecb1f48bbffb0"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:39 executing program 0: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:39 executing program 5: r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000008c0)=ANY=[], 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000080), 0x0, 0x0, 0x8) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0xff, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r4 = request_key(&(0x7f0000000700)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000640)='-securityvboxnet1\x00', 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="97", 0x1, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r6, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) keyctl$search(0xa, r5, &(0x7f0000000600)='blacklist\x00', &(0x7f0000000200)={'syz', 0x3}, r6) keyctl$read(0xb, r5, 0x0, 0xfdbb) r7 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000380)="9698dbb56dd68937e5d2369b6932562c029e43409ccf5a90ad2df62fe1bf8994cb96c94632d20745ecae0c794767eff894c9c8b1364d6b6572e027be622949c82c235d02561a23c30a2b42303c03809154b37a1fa4aed60379bbb8b0f2d7976a5497c08ddbaa0091592d02979206791ded742bc74dfa1a05", 0x78, 0xfffffffffffffffd) r8 = request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)='md5sumnodev[procem1securityvmnet1#\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r4, r8, r7}, &(0x7f00000000c0)=""/38, 0xfffffffffffffcd0, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/d\xcd\x93uE\x00\x000\x00', 0x604040, 0x0) ioctl$RTC_UIE_ON(r9, 0x7003) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r10, r9, 0x0) ioctl$UI_SET_PROPBIT(r10, 0x4004556e, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 03:55:40 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) r2 = gettid() r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x84, &(0x7f00000003c0)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r7) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x4000, 0x0) r9 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r9, 0x200004) r10 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/member\x00', 0x2, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r11) r12 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r12, 0x200004) io_submit(r4, 0x5, &(0x7f0000000900)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x9, r5, &(0x7f00000002c0)="e256f20554c617b5786540aa6d64a73a7a4dce5b1d71833eb5b4638f0262f0814c8691075a423ff6574530f57992e299594b248089b0d8505fbad810be102050658a84bdb4ef4accb8f6c7434760bf41c2c350fbb7de5dd813b2b2cc86fac76098c31bca8580ae7d80e261bb4d631d66e6ddc1090b9f87aeceff9d70cb84ec44277e17cf386937e2ce3ebae9cf4f5fb700", 0x91, 0x0, 0x0, 0x0, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x7, r7, &(0x7f0000000440)="8775a709b6ab0268547d046857b3496740a9bc7731d4b6e0857001faac895cba9dfdc65cd53157912f44270187a78185ab4718d6ca1752debebb9c0f5971891118d2921413f458c4603769989ee9e76d0ea86be14d7253ded558a850f40a87cb9156ca6c8d362f4713a15f3903ca44e9ca6a95d96be966952beb9a127be0ae012684e5528de180bc48af8d196644e8d924f1731f2747ec3a192a8754d5a8c6c2277a82a5bcae4af9796455b0d996b0d05fa4501f07e46c4273352f03e1affba07407", 0xc2, 0x7f, 0x0, 0x2, r8}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x2, 0x6fbf, r1, &(0x7f00000005c0)="db180034185a195230dd77e81816c799751fa4741449095509f5addf6f2f94a6dbe1fd0cc4826a311e3002d12e25956ab29e7e4661dc626f13772ffa89629a3b05e0532654f9efca724cf4be863941329b828014ede4b99dde643d701627bf15813a496c759d8659272c051772e2efcd4ec33a9a16d19a014ae10d2889000b93fb3cb27f365578ade7a1288e70368a6387f25f72a6214aeb1ae407516a35c6f8b20a4d2a4974ee183acb9ee5935792f641bac823f6d97e5851fdd077be73db5f30330a79f394b6bc1aa896e3306f4f22a195b4044dda0342d487ebffa6a43be9655acda06b6c2d908ea832b1f0344e0960", 0xf1, 0x21330000, 0x0, 0x5, r9}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0xfffd, r10, &(0x7f0000000740)="8bdbbef821b485cea2f0f1a85a80b2d065e161c4e205e838412fdc5953e512fce21dac1dc467eef247df7a93c2198b933ad5fbf2e183564afb6d669007387677", 0x40, 0x5}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x0, r11, &(0x7f00000007c0)="9ff0e27d21e17a4ad8fe7755fa8752937fbcbfe4890b86490c7c6f30d903fd6e02864b8e7d8df23829ef1b7f5be40b566322146cf860290f26f281971ad549a429c438ce0c25df7db6964f88e6dee8e228e801bfbdc274187ad0808c0ca03a73c3a8613db38f9c03854bff5bcbda941b3e6dd79b7182d2ac607ac5933617ef82d9a59c31a8795274468c767a7a2695584adc232ef1b4b9fcfdefa89fbe85a638f1ce2cfde8f2117fdabaad0bceaad28ac5ba5bb8c9225f8a922a30c770e98050b2ecfa30fc08e4765419f2da99dffe0e44abab8e02960d92513ac6c5c8177c7d", 0xe0, 0x80a4, 0x0, 0x0, r12}]) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) sched_getparam(r2, &(0x7f0000000280)) r13 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r13, 0x200004) r14 = openat$cgroup_ro(r13, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) read$char_usb(r14, &(0x7f0000000200)=""/125, 0x7d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1735.815057] audit: type=1400 audit(2000001340.133:1613): avc: denied { create } for pid=13434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1735.867131] audit: type=1400 audit(2000001340.193:1614): avc: denied { create } for pid=13434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1736.283347] audit: type=1400 audit(2000001340.603:1615): avc: denied { associate } for pid=13448 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 [ 1736.601177] audit: type=1400 audit(2000001340.923:1616): avc: denied { create } for pid=13434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1736.608649] audit: type=1400 audit(2000001340.923:1617): avc: denied { create } for pid=13434 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1736.942901] audit: type=1400 audit(2000001341.263:1618): avc: denied { associate } for pid=13448 comm="syz-executor.5" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:55:42 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:42 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf", 0x52d, 0xc001, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x6, &(0x7f0000000100)={0xb, 0xffffffff, 0x3ff}) sendto$inet6(r0, &(0x7f0000000040)="ba04a76fbfed0ca03c533357bb656c6163b1d101f400000291a57f2c2738531686477ffdc9bc6b9d578468c010217e5c8572c57583ee918e3d549e4dcfa94682213f8e86e328f23f58fc83c7690186ae341745ca040000000000000062f7f61b590780d6f297d5b394ab3f4500ea9a985275223b", 0x74, 0x2004c084, 0x0, 0x36a) sendto$inet6(r0, &(0x7f00000003c0)="3ce9ff7f000000000000ca63", 0xc, 0x0, 0x0, 0x0) 03:55:42 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:42 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x1011d) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000018c0)={0x0, 0x1, 0x0, 0x10000020}) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{0x3f, 0x9, 0x3, 0x3872}, {0x4, 0xff, 0x6, 0x1}, {0x4, 0x3, 0x9, 0x400}]}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) fsetxattr$security_capability(r2, &(0x7f0000000080)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0xffffffff, 0x80000000}, {0x40, 0x8}], r3}, 0x18, 0x6) 03:55:43 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="dfd2cd809cae059afa916a01b182077f9e30dd6c42cd0585acc140f856684d4386339cc8199564d318d098698acc76b874b47ddccc622d159269d39f46fcafe5ab35fd6f907a04e92b7141d60853f7e76577eba71a020f53ae0010ec06db13a2735f24053a00dc342dfed2b2d72e17a04c1dded8285ed15a9c234aea8c3de9cf30e70ab98a4508013f75c8e474ab6d"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="eabe9f303b222957010000000000000074edb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9effd7e4ab9c009b2dd1c28c920bb8e8bf7a301ffe8d3b1c63000090f78769d0a57d8100d0be0000000000805bc326dc9ef499b67b4f18de6a8cbec07831212facced7371dae377a926c0ae3ff0fc45e87a3319ad15cf6d96cb9f768f88d57146d095e83d01cdcd78adacef61226f102ec13dcd4e3a8d690b38913e969a88f18", @ANYBLOB="e62122cb1bc151de8e00000100004c117eb6009b3d81748d5247bbdcf65de7df84fa63e9649fd39abfe11a28598ee1e25d5fac4886"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpgid(0x0) ptrace$setregs(0xf, r1, 0x6, &(0x7f0000000140)="6f408068a016") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:43 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000004c0)='system.posix\x9c\t\x00\x00\x00\x00\x00\x00\x00\x00ac\x03n\xf58\x00;d\x19G(5{E\xd5\\\xe79\n\x18\x00Xo\xddq\xec\xf7\x11\x13q\xba\x17\x9b\xb7]R\x9e\x0e\x19\xdc\x8fF\xe7\xfc\xe6\xfai\xd4j\x8cx\xb5\xb9\xa9\xf4\x82\x96\a\xbb\xe9*\xb3\x11\xcez\x9a\x91\xab\xd3m\x95\xfe\xab\xf9\xcc\xb7\x85&\xc0|\f\xd7\xa2 >o\x19/\xd1aC\xd3\xd7\xe5\x8eR', &(0x7f0000000800)=ANY=[@ANYRES32=0xee01, @ANYBLOB="e62725d97524ceb85863b7c4f8540fe0b4f0832f5bc5d4fc31300b88cfc1b239730a97060ab50a5542a78d6b51e07e8141e658baf63577a3e183901d010abded2004fb4e1385729efed97f9c33fe08655b2eea933e6637fbd1327b629f66f5c8", @ANYPTR, @ANYRES32, @ANYBLOB, @ANYBLOB="08000200d29cfee83d23a475b03e384fc393c1f8b1ed0ec0f93400000002e3bfbc927114fa14b49d837a9965cf1cf244a69d0fd6fcdce6084e654e5e4cc392d1b25c0da0bcc52ea4bd89b92660988dbb820af038b6d6d4f0d8acf2f4bad14740043303", @ANYRES32=r0, @ANYRES16=0x0, @ANYRESDEC=r2], 0x9, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x58) ftruncate(r3, 0x200004) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x1}, 0xb) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) ioctl$EVIOCSKEYCODE(r5, 0x40084504, &(0x7f0000000180)=[0xffff, 0xff]) 03:55:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x10006, 0x20010, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x5}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)=0x7) socket$inet(0x2, 0x4000000000000001, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x200) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selifux/st\x02t/%\x00', 0x0, 0x0) getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, 0x0) setuid(r5) lchown(&(0x7f0000000180)='./file0\x00', r5, r3) setuid(r5) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000380), 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo\x00') socket$inet6(0xa, 0x80003, 0xff) r6 = socket$inet6(0xa, 0x1f62ac6709a8cd67, 0xff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0xfffffffc, @ipv4={[], [], @remote}}, 0x1c) 03:55:43 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:43 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x94, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x80, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f901012898a22d1f2aefdf442852d9c9a27def000000000000730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:43 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) pipe(&(0x7f00000003c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x0, 0x2, 0x7, 0x6}]}) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000002000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 03:55:43 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:44 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000000180)=0x4001, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x1) sendto$inet6(r0, 0x0, 0xfffffffffffffe84, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000001c0)=@nl=@proc, 0x411, 0x0}, 0x2000) 03:55:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872843afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="696e6f64655f7265616461686561645fe8db2e3368875f2085626139313800"/41]) 03:55:44 executing program 0: set_tid_address(&(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/250) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x63d}, 0x4, 0x200000000000000, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) readv(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x408000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x5}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x408000, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRES64, @ANYRESDEC=r2, @ANYRES16=r3, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRESDEC=r4, @ANYRES16=r5, @ANYBLOB="293d600f40018010640ceb3aa7b9d6ffeb594fbe899ba10c3f85929be04098594da34acacee5589380e55744ded6fab7353c2cab5a2b2da6b1f5a5eb3296caa97408c8e82b0500000000000000bfb9d3707608a47f1ba27a5b13df47efd68627e03b3dcaede72a40d361c6"]], 0x42) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 03:55:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1740.557186] EXT4-fs (loop5): Unrecognized mount option "inode_readahead_èÛ.3h‡_ …ba918" or missing value [ 1740.685067] EXT4-fs (loop5): Unrecognized mount option "inode_readahead_èÛ.3h‡_ …ba918" or missing value 03:55:45 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1741.377003] audit: type=1400 audit(2000001345.703:1619): avc: denied { associate } for pid=13569 comm="syz-executor.0" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 [ 1741.536944] audit: type=1400 audit(2000001345.863:1620): avc: denied { associate } for pid=13569 comm="syz-executor.0" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 03:55:46 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:46 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:46 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ptrace(0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x7, {{0x1, 0x401, 0x2, r1}}}, 0x28) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000040)="2eef501d69e1eb2424ebeaa64ea7d38d84a3d45f9453a1b52d4bc3c0291eaec99e2b0dac85ff6b171dac9d36581af701c9a444b1be8fa7a25f9f643dd59ae68a1de405839a3a3e7f9356c7", 0x4b) poll(0x0, 0x0, 0xffffffff) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x44000102, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "00000000020d6bfded2342273716fbaa28f7be83"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000100)={0x3ff, 0x80000001}) 03:55:47 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:47 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:47 executing program 0: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) r0 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ftruncate(r0, 0x200004) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x64, @multicast2, 0x4e20, 0x4, 'fo\x00', 0x20, 0x100, 0x6a}, 0x2c) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000002c0)={0x7, 'veth0_to_hsr\x00', {0x7}, 0x60}) close(r2) mount(&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX=r2, @ANYBLOB="c9bee30b9bb87fefcb2b79c8731286e3bc60c01aa2eab65a16d06d5fbda2636bb55147f03aca6efabeecec4afbc9ea79f09207509bb5f34a1017a168c03abf3a864c7b558a986ca8024df96c887ebc105195bf9628cc77149caa7f7644a5207d5ff9d7414ee1f8b49c53e007ae44d3e5d26c1c36c32bf238e9c58934025c9b80b7a83bd252cb83123ff594dd0bb59fe65128300f3e35fb5c502e61001635cc5bfaa2b605ad82cc3dab15e7ad06068b0d50912a3e7090c62bcb3dc721fc5fb0d938987d8c43f46b783418ccc31bd14e2c63b39420ad3ffb8d02694a7168e1ed10813e56e879a26bd5"], &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x1a5e4aa, &(0x7f0000000380)) 03:55:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:47 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000200)={0x52, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x8000, 0x0, 0x0, {}, 0x0, &(0x7f00000001c0)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:47 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f0000000200)={0xa9, 0xa, &(0x7f0000000980)}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r6) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x4000000000005) r8 = dup3(r7, r6, 0x0) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000100)={0xfffffffc, 0xfffffffffffffff9}) write$UHID_INPUT(r8, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a4154041aafbb5095a410260e5bc173dc95070e5f607c60e67e0d74595a4584a6f775e4a1f6df10310d336e59e073c3c9aaebfd21e78818bdba6dba8de330f5dbfe303be6e92c1bb89bd7fe759e66eee92b52537b00a87df8e02d3610cf27dba8c9e508d90164810b47ccce4ce5d7cb819e2d3e336f77b8e6f760562039008b0444915648aa78a3b5640d1ffc2a5da258255f82bd0f5ee5bcb4bca2223ffeb24eacc1808d86322c478a812b3f5440e30786c2d784adb033552f7374cad7cb7feb88e7eb30112d29dced28afd888d5b191baec5ebfa39747d237c3e"], 0x2) 03:55:47 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:48 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) mknod(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x4}, 0x3200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @rand_addr=0x4}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x100, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x0, 0x4}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x87f1a7) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe4d29a857497e7fc}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6c010000e439ff41a2c9584e9a83f099efaa789a9196ae40bb5850e90a5c8829927aed2f024feb4b1d2dc2212e8327a6ba2d", @ANYRES16=r3, @ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x80}, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x400e64f, 0x7, 0x5}, 0x10) unshare(0x40000000) socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) write$nbd(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="674477ec33cbd4958d1ead55042555045326f0db000500020002000000a5ae1cfb5809d544920000000000fe8f01eafc3ccbeff6da8613f5c657f255d9ffe21f1da56cb81eb726b532a1db954085b04d106109000000000000001ed8bce9c4977394c11b7b150000000000000000000000217149ffcf7e485ae1c9c4fb1be625854e6da4f117e959b0860b6c9dc1a89c7c64c3202075cd90c2e803a8715b2c6fe7448fc6"], 0x1) ptrace$peekuser(0x3, 0x0, 0x1) [ 1744.669850] audit: type=1400 audit(2000001348.993:1621): avc: denied { create } for pid=13686 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1745.008080] audit: type=1400 audit(2000001349.333:1622): avc: denied { create } for pid=13686 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:50 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f0000000200)={0xa9, 0xa, &(0x7f0000000980)}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r6) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x4000000000005) r8 = dup3(r7, r6, 0x0) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000100)={0xfffffffc, 0xfffffffffffffff9}) write$UHID_INPUT(r8, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a4154041aafbb5095a410260e5bc173dc95070e5f607c60e67e0d74595a4584a6f775e4a1f6df10310d336e59e073c3c9aaebfd21e78818bdba6dba8de330f5dbfe303be6e92c1bb89bd7fe759e66eee92b52537b00a87df8e02d3610cf27dba8c9e508d90164810b47ccce4ce5d7cb819e2d3e336f77b8e6f760562039008b0444915648aa78a3b5640d1ffc2a5da258255f82bd0f5ee5bcb4bca2223ffeb24eacc1808d86322c478a812b3f5440e30786c2d784adb033552f7374cad7cb7feb88e7eb30112d29dced28afd888d5b191baec5ebfa39747d237c3e"], 0x2) 03:55:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:50 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000004c0)) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000800)="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", 0xc00}, {&(0x7f00000002c0)="3556cdb18246c862a693c0089b84b1009ebfb8c8f795f7991809346ec6821bf42ad3a903bf9d0fae3065b23982c7aa4db433a25737b60dfa37a328ee0aab61d484482c38a83efad9f694aecedc75662776acd9e564ca708d34d721504d439ed45608e61810ab26c021ba183e66d7f287ea2ffec72c612af7b18017bb7521b684d1e29c5d80bc37be02bee6d71d7db60af31f2301a0b61537c9c77cde4898d3442c34f365ef24ad06a314a889a21f86680b645194746f0a784e57996ad102c3b4eec10515c1a5d8dfc0b396f0f903aa94102a14f15e2e9c43a628622ce3435dd89efafc6feecb5c", 0xe7}, {&(0x7f0000000140)="07b2d1e02f857ad1c330a26b8c2ed269df186ee91ad0c48208e1da2b6a07", 0x1e}, {&(0x7f0000000240)="a21fef0d56c64dc797d4c5ad6403a12c63dbeaf21b6875bf2629ec28", 0xfffffffffffffeb1}], 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) fcntl$setstatus(r3, 0x4, 0x2000) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r4, 0x0, 0xfffc) 03:55:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f0000000200)={0xa9, 0xa, &(0x7f0000000980)}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r6) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x4000000000005) r8 = dup3(r7, r6, 0x0) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000100)={0xfffffffc, 0xfffffffffffffff9}) write$UHID_INPUT(r8, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a4154041aafbb5095a410260e5bc173dc95070e5f607c60e67e0d74595a4584a6f775e4a1f6df10310d336e59e073c3c9aaebfd21e78818bdba6dba8de330f5dbfe303be6e92c1bb89bd7fe759e66eee92b52537b00a87df8e02d3610cf27dba8c9e508d90164810b47ccce4ce5d7cb819e2d3e336f77b8e6f760562039008b0444915648aa78a3b5640d1ffc2a5da258255f82bd0f5ee5bcb4bca2223ffeb24eacc1808d86322c478a812b3f5440e30786c2d784adb033552f7374cad7cb7feb88e7eb30112d29dced28afd888d5b191baec5ebfa39747d237c3e"], 0x2) 03:55:51 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ptrace$setregs(0xb038e7bca7bfef0f, r0, 0x0, &(0x7f00000001c0)="fb8d5f3b38b983be8151f863c33da813e984") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:51 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f0000000200)={0xa9, 0xa, &(0x7f0000000980)}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r6) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x4000000000005) r8 = dup3(r7, r6, 0x0) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000100)={0xfffffffc, 0xfffffffffffffff9}) write$UHID_INPUT(r8, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a4154041aafbb5095a410260e5bc173dc95070e5f607c60e67e0d74595a4584a6f775e4a1f6df10310d336e59e073c3c9aaebfd21e78818bdba6dba8de330f5dbfe303be6e92c1bb89bd7fe759e66eee92b52537b00a87df8e02d3610cf27dba8c9e508d90164810b47ccce4ce5d7cb819e2d3e336f77b8e6f760562039008b0444915648aa78a3b5640d1ffc2a5da258255f82bd0f5ee5bcb4bca2223ffeb24eacc1808d86322c478a812b3f5440e30786c2d784adb033552f7374cad7cb7feb88e7eb30112d29dced28afd888d5b191baec5ebfa39747d237c3e"], 0x2) 03:55:51 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000004c0)) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000800)="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", 0xc00}, {&(0x7f00000002c0)="3556cdb18246c862a693c0089b84b1009ebfb8c8f795f7991809346ec6821bf42ad3a903bf9d0fae3065b23982c7aa4db433a25737b60dfa37a328ee0aab61d484482c38a83efad9f694aecedc75662776acd9e564ca708d34d721504d439ed45608e61810ab26c021ba183e66d7f287ea2ffec72c612af7b18017bb7521b684d1e29c5d80bc37be02bee6d71d7db60af31f2301a0b61537c9c77cde4898d3442c34f365ef24ad06a314a889a21f86680b645194746f0a784e57996ad102c3b4eec10515c1a5d8dfc0b396f0f903aa94102a14f15e2e9c43a628622ce3435dd89efafc6feecb5c", 0xe7}, {&(0x7f0000000140)="07b2d1e02f857ad1c330a26b8c2ed269df186ee91ad0c48208e1da2b6a07", 0x1e}, {&(0x7f0000000240)="a21fef0d56c64dc797d4c5ad6403a12c63dbeaf21b6875bf2629ec28", 0xfffffffffffffeb1}], 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) fcntl$setstatus(r3, 0x4, 0x2000) r4 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r4, 0x0, 0xfffc) 03:55:52 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000001c0)={0x80000000}, &(0x7f0000000200), &(0x7f0000000280), 0x8) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:54 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:54 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:54 executing program 0: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) fcntl$lock(0xffffffffffffffff, 0x10000000000025, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x4, 0x0, 0x801}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x01\x00', 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'], 0x2c, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L+', 0x7fffffff}, 0x28, 0x1) fchmod(r4, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f00000002c0)=0x8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r7) fsetxattr(r7, &(0x7f0000000340)=@known='trusted.overlay.opaque\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', 0x16, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000100)={0x3, 'vcan0\x00', {0x6}}) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 03:55:54 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dfd6f34689a80a0333cfad"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:54 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x10020000802, 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='tunl0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000200)=0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000080)=@req3={0x0, 0x40, 0x0, 0x3, 0x6, 0x7fff, 0x8}, 0x1c) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x1f, 0x3, 0x7f) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS1(r5, 0x8004745a, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, 0x0, 0x40000000) 03:55:54 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:54 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) r4 = dup3(r2, r3, 0x80000) renameat(r1, &(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000200)='./file0\x00') sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1749.981247] audit: type=1400 audit(2000001354.293:1623): avc: denied { create } for pid=13777 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030002778f47bcadeef1d9e81479e4e40000f8ffffff001b0a0000000092fa87b4ed1e7613ea980bc9b676b2bf5ff1e4c2b09d7a45b1bd32112bda2b7cd4c2424323fffe1478a40199a4ade375d7327becd51249e176645633e48f"], 0x28}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x4, 0x70bd25, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2d8e6e4ab31aa618}, 0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x8) fsetxattr$security_selinux(r3, &(0x7f00000000c0)='security.selinux\x00', 0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)) [ 1750.328404] audit: type=1400 audit(2000001354.653:1624): avc: denied { create } for pid=13777 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:55:55 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @initdev}, &(0x7f0000000200)=0xc) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000240)={{0x11, @local, 0x4e23, 0x4, 'wrr\x00', 0x3, 0x7f, 0x18}, {@rand_addr=0x80000001, 0x4e20, 0x1, 0x40, 0x7fffffff, 0x8}}, 0x44) tkill(r0, 0x3b) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:55 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:57 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:57 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x432041, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x40, 0x0, "aefed15b86420e3bc12fe2d9d653a3da56afbbb6c85fbc4cfb02b64fc9968dea69c577d0b005a2a06d114ed3af71ed98cf1093ca5768c0bf1df627dd559172879b5eaf73d524f8a26a1a2973826da21f"}, 0xd8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00 \x00\x00'], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000380)={@ipv4={[], [], @remote}, 0x37, r3}) 03:55:57 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(0x0, 0x0, 0x0) getuid() r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="b8643d75025ff2ab9a5ef092773181787c017fdd8807d24a0c0a07da54b39e39c6c4976a223446dde219d3e74fe3a55a57e2ea9ba6450000", @ANYRESHEX=r2, @ANYRES32=r2, @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dc9b3a06ba64201b03bcfea404c03827727cf2e3b0fca984294afb197eddcf886d2f30301356ee87219d9519a08c15740fa6dc2597455115a1d6600", @ANYRESDEC=0x0, @ANYBLOB="2c00a44d7b5f32e3d35234c224b58b531fd31ba176ef28f37a14468a52b8d84a9a0bb408b3d289581d25c97e9ff9150f6d40d67330f911fa3dc60eb2cba3997ac51ee599ce5f28a7bfe0feffdfa2abbf69627d7e4dfa617955f7b0633ea24c5750a63bda073430317ea16556e06349fa21d4271d0fd994db442c7c25c150ad2395f0f1b3b5bf37d42fad19ca312c9c2e32fbe3a42aaba81777de158db275f95e70df903b513050d57eb3f34237a119b7e6821fd9a312ac89b6467201ac2149511d7ab8cdb7f5a164eed5f65cf1988bc5"]) r3 = accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x0) getsockname(r3, &(0x7f0000000140)=@pppol2tpv3, &(0x7f00000001c0)=0x80) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r6) dup(r6) ioctl$TIOCSCTTY(r5, 0x540e, 0x0) ioctl$KDSETLED(r5, 0x4b32, 0x8) 03:55:57 executing program 0: sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x1000000000000242, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x7f, 0x44dc24d75646a4b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext={0x2c, 0x56cc}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x916366bc4cb5adc9, 0x0, 0x2d7) socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0xc020, &(0x7f0000000100)=0x0) socket$unix(0x1, 0x0, 0x0) io_submit(r1, 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x100000001) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) eventfd(0x0) r4 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xdc81778d9432911a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:55:57 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="ecd2e480"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RWSTAT(r2, &(0x7f0000000200)={0x7, 0x7f, 0x2}, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(0x0, 0x0) io_setup(0x1ff, &(0x7f00000003c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x7530}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) fcntl$setstatus(r3, 0x4, 0x44800) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r6) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x20}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, 0x0, 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r4}) 03:55:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:55:57 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(0x0, 0x0, 0x0) getuid() r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="b8643d75025ff2ab9a5ef092773181787c017fdd8807d24a0c0a07da54b39e39c6c4976a223446dde219d3e74fe3a55a57e2ea9ba6450000", @ANYRESHEX=r2, @ANYRES32=r2, @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dc9b3a06ba64201b03bcfea404c03827727cf2e3b0fca984294afb197eddcf886d2f30301356ee87219d9519a08c15740fa6dc2597455115a1d6600", @ANYRESDEC=0x0, @ANYBLOB="2c00a44d7b5f32e3d35234c224b58b531fd31ba176ef28f37a14468a52b8d84a9a0bb408b3d289581d25c97e9ff9150f6d40d67330f911fa3dc60eb2cba3997ac51ee599ce5f28a7bfe0feffdfa2abbf69627d7e4dfa617955f7b0633ea24c5750a63bda073430317ea16556e06349fa21d4271d0fd994db442c7c25c150ad2395f0f1b3b5bf37d42fad19ca312c9c2e32fbe3a42aaba81777de158db275f95e70df903b513050d57eb3f34237a119b7e6821fd9a312ac89b6467201ac2149511d7ab8cdb7f5a164eed5f65cf1988bc5"]) r3 = accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x0) getsockname(r3, &(0x7f0000000140)=@pppol2tpv3, &(0x7f00000001c0)=0x80) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r6) dup(r6) ioctl$TIOCSCTTY(r5, 0x540e, 0x0) ioctl$KDSETLED(r5, 0x4b32, 0x8) 03:55:57 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {0xfffb}, {}, @period={0x0, 0x40, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000006c0)=""/4096) fsetxattr$security_smack_transmute(r1, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000200)={0xd, 0xf, 0xfffd, {{0x8e2259c2a6909f1e, 0x2, 0x5}}}, 0x2df) ptrace$setopts(0x4206, r0, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x20000, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x6, 0x0, [], [{0x1, 0x1f, 0x5, 0x6, 0x20, 0x400}, {0x10000, 0x200, 0x1ff, 0x81, 0x6, 0xffffffffffff0000}], [[], [], [], [], [], []]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x0}, 0x20) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) rt_sigreturn() ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x0, @can={0x1d, 0x0}, @nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x10000}, @generic={0x8, "d77b9b6960790e1eea1f381bf019"}, 0xb4b4, 0x0, 0x0, 0x0, 0x100, &(0x7f0000000300)='bcsh0\x00', 0x7, 0x1, 0xcb}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vcan0\x00', r7}) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000180)={0x5, 0x4}) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x40, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$9p(r0, &(0x7f0000000600)="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", 0x200) 03:55:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1754.117851] audit: type=1400 audit(2000001358.443:1625): avc: denied { setattr } for pid=13896 comm="syz-executor.2" name="current" dev="proc" ino=90565 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=0 03:56:00 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd"], 0x3}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:00 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$pokeuser(0x6, r1, 0x4, 0x265) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:00 executing program 5: r0 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r0, 0x200004) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@local, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000061400,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0xffffffc3, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0xcc, 0x0, 0xf37e}}, 0x50) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) r5 = syz_open_pts(0xffffffffffffffff, 0x401) ioctl$KDADDIO(r5, 0x4b34, 0x800) close(r4) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[@ANYRES64=r4, @ANYRES64, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYBLOB="43501249d727b7f580561c74f10f65abb17c957dae052a4cb8f2bb9b6536b488a9dbd4d8aa8d28708120d1b15e8e6e9d4527103d1d50c2200227fc254edd7603b8b1dfc748104f17ec9a9deaad1509e99b28a5c2952403ca07bd07a519ec2d294f903e688fdb92110044fddc9ba2dda82a7b74c6d19fd39b71268270d9c5972d4ee742096623c4515d112447d03b371fcd8a4862461a481b0b31746d"]], 0x5) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r8, 0x200004) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r8, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x0, 0x2, 0x9, 0x2, 0x20, 0x3f, {0x3, 0x5, 0x93, 0x4, 0x6a25, 0xdbb, 0x5, 0x1, 0x3, 0xdde, 0x5, 0xee01, r9, 0x5, 0x8000}}}, 0x90) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:56:00 executing program 0: socket$packet(0x11, 0x2, 0x300) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, &(0x7f0000000040)=0xfc76e4a4e14c28fd) perf_event_open(&(0x7f0000000040)={0x1, 0x39d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='GPL\x00', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000001540)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) open(&(0x7f00000002c0)='./bus\x00', 0x200000, 0x8f) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x3}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) socket(0x10, 0x5, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @local}, 0xfffffffffffffff5) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:56:00 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:00 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) accept4(r1, 0x0, &(0x7f00000001c0), 0x80000) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1756.525219] audit: type=1400 audit(2000001360.843:1626): avc: denied { create } for pid=13916 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:01 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1756.839853] audit: type=1400 audit(2000001361.163:1627): avc: denied { create } for pid=13916 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x10, &(0x7f0000000240)={&(0x7f00000003c0)=""/76, 0x4c, 0xffffffffffffffff}}, 0x10) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_UNALIGN(0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r4) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0x7, 0xfff, 0x4}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) shutdown(0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) mount$bpf(0x0, 0x0, 0x0, 0x80808, &(0x7f0000000540)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r2}}, {@smackfstransmute={'smackfstransmute'}}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x0, 0x70bd29, 0x0, {}, ["", "", "", "", ""]}, 0x14}}, 0x2040000) 03:56:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) dup(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)={0xfffffffffffffff7}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_UNALIGN(0x6, 0x2) clone(0x3000000a2162101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='clear_refs\x00') writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0x2}], 0x6) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000280)=""/179) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x5, 0x86e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000780], 0x0, &(0x7f0000000080), &(0x7f0000000780)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x9, 0x36, 0xcee5a0005f9f0e60, 'lapb0\x00', 'team_slave_0\x00', 'erspan0\x00', 'ip6erspan0\x00', @local, [0x101, 0x1fe, 0xff, 0x7f], @random="ccc72ffd6ba1", [0x0, 0xff, 0xa5d51c12f6fc62f6, 0x0, 0xff], 0x11e, 0x11e, 0x14e, [@stp={'stp\x00', 0x48, {{0x50, {0x3, 0x556, 0x1, @dev={[], 0x11}, [0xff, 0xff, 0x0, 0xff], 0x0, 0x3, 0xfffb, 0x101, @random="ef24a181209c", [0x0, 0x0, 0xff, 0x0, 0x181], 0x4e22, 0x4e20, 0x0, 0xb12b, 0x9, 0x4, 0x5, 0x20, 0x6, 0x2}, 0x20, 0x850}}}, @quota={'quota\x00', 0x18, {{0x1, 0x0, 0x100000001, 0x9}}}], [], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {0x5, 0x6, 0x809b, 'bcsf0\x00', 'bond_slave_1\x00', 'veth1_to_team\x00', 'bpq0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff, 0x80, 0x0, 0x7f], @broadcast, [0x0, 0x0, 0xff, 0x0, 0x0, 0x1fe], 0x6e, 0x9e, 0xee, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8}}}], @common=@log={'log\x00', 0x28, {{0x8, "18857e2326c5d50504eb536c3ea7c7f8bbf67c13b49d69c6de79d9679039", 0xe}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x3, 0x50, 0x0, 'bond0\x00', 'veth1_to_hsr\x00', 'caif0\x00', 'syzkaller0\x00', @dev={[], 0x26}, [0xff, 0x80, 0xff, 0x0, 0xa3e597342b8fd849], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x101, 0xff, 0x8579b0046c08f305, 0x0, 0xff, 0xff], 0x9e, 0xce, 0xfe, [@state={'state\x00', 0x8, {{0x1}}}], [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{0x3, 0x1a, 0x5, 'veth0_to_bridge\x00', 'hsr0\x00', 'teql0\x00', 'bcsh0\x00', @random="bc10c4479f34", [0x1fe, 0x101, 0x0, 0x0, 0x7f], @broadcast, [0x6bcf3711fde6138d, 0x0, 0xff], 0x6e, 0x1ce, 0x2fe, [], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:setrans_var_run_t:s0\x00'}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x800, 'system_u:object_r:xserver_misc_device_t:s0\x00'}}}}, {0x9, 0x2, 0x8206, 'veth0\x00', 'batadv0\x00', 'team0\x00', 'team_slave_0\x00', @remote, [0x1fe, 0x0, 0x7f, 0xff, 0xff, 0x7f], @dev={[], 0x29}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe], 0xe6, 0x146, 0x176, [@ip={'ip\x00', 0x20, {{@rand_addr=0xfffffbff, @multicast2, 0x0, 0xff000000, 0xe7, 0x6c, 0x0, 0x20, 0x4e24, 0x4e21, 0x4e22, 0x4e20}}}, @cgroup0={'cgroup\x00', 0x8, {{0x4, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x9}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}]}, 0x8e6) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x29, 0x1, {0x1}}, 0xb) wait4(0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) uname(&(0x7f00000001c0)=""/70) prctl$PR_CAPBSET_READ(0x17, 0x18) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000740)={@empty, 0x18, r4}) 03:56:01 executing program 2: clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x213, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4bdfd9265e80c28e8e6a9051ec0ab6ae34a3ff"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a6482054681e9ed56adb3b91e7f1ffd7e495757e36d6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:03 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd"], 0x3}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40100, 0x0, 0x1ff, 0x4, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000005, &(0x7f0000000040)={0xa, 0x2, 0x401, @empty}, 0x7) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000007, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 03:56:03 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:03 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="28d24000bf49f26d0fcb0e91f376b44e1d12b41fb9ce9ffa16adc94c87e108fd59cc71c35d1700102d9b142cbb459bd60c56ed8e9f190d65061e9c393e8c66473c9b8c5b9ad77fc261f057535f831dd539adec6f2147701aa7f13b58d5b258"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimensat(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:03 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xa, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x2081ff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x103000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x8, 0x80000000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r2, 0x6}, 0x10) 03:56:04 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:04 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="dfb6cd8055fd3630d11296fa9e07b4cfe881f3324f9ed61ffc4ca4a80417251432f343f17d1849678ec31aa21088f1f4d01affe5f0b92e38499699bafe9cc1a4ea2d12a2e7a180c88e0ec8a880cc87beb072f6239e38cb28"], 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:04 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xa, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x2081ff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x103000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x8, 0x80000000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r2, 0x6}, 0x10) [ 1760.315655] ip6_tunnel:  xmit: Local address not yet configured! 03:56:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:05 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:07 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd"], 0x3}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:12 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) fsetxattr$security_selinux(r1, &(0x7f0000000500)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:lastlog_t:s0\x00', 0x1f, 0x5) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) ftruncate(r3, 0x200004) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x7) ptrace$cont(0x7, r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f00000004c0)=0x44) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xdc, r6, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x54}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x49}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}]}, @TIPC_NLA_MEDIA={0x4}]}, 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x44ca1) keyctl$setperm(0x5, 0x0, 0x400000) 03:56:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:12 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:13 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:13 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1769.221324] audit: type=1400 audit(2000001373.543:1628): avc: denied { create } for pid=14311 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1769.498636] audit: type=1400 audit(2000001373.823:1629): avc: denied { create } for pid=14303 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:13 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:16 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:16 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) io_setup(0x9, &(0x7f00000000c0)=0x0) io_getevents(r3, 0x6, 0x6, &(0x7f0000001640)=[{}, {}, {}, {}, {}, {}], 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r4) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r5) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001540)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16=r1, @ANYPTR64], @ANYBLOB="c56280f69ab54734222671f4c716f4e2fce8c818cd25c20021bb08b9250fca73262335499424742432306fb98f57fd52d5d30a21ef595b3c60d7389a7865c30b952ce8b239a8a70710e30f0688c19895dec88202e24065a0061962e8546a7fa3a246c113b8e3d134ba2cc2f1d1277f77684f5f903e5a43dd10acf3d23c605c65524149edb4db9826bb5c7327bba7ba89350971cc2edb0902417584993c1aef3d971e072dadf50995dbf7812e5cde94657ed7a695db2c6a9ae9ec849975258c3d33cd69774adba27b331d88589d", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32]], @ANYRES32=r2, @ANYBLOB="e7", @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r1, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYPTR, @ANYRESDEC=r4, @ANYPTR, @ANYRES64, @ANYPTR64, @ANYRESDEC, @ANYRES32=r2, @ANYPTR], @ANYBLOB="af0160014e1012bccdf1e4dac1d65cbc63ba3308d7116c69d39bdb9b5be8f8044292cd1ea200cab287a906f39f4e7a7981c5ed286aa8370a2cf4f4bc563fbfe158b6c911e7ecbc66eb5af3a899b11a0742738a8a587ca4daf95d", @ANYBLOB="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", @ANYRESDEC=r5]], 0xea}}, 0x4000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r6) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r7) sendfile(r7, r5, &(0x7f0000000140)=0x8001, 0x3) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000001700)=ANY=[@ANYRESDEC=r6, @ANYBLOB="248c11f763b351b12402c88fd13268353d9c17f2592f5e304174108945cca1dc40894b4d7e70f3c483bb01fa520ff0e1ad0e514c912b7f9407f71f03b6", @ANYRESDEC=r8], 0x0}, 0xffffff3a) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) capset(&(0x7f00000002c0), &(0x7f0000000300)={0x3ff, 0x8000, 0x10000, 0x81, 0x7, 0x100}) mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) 03:56:16 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r2) r3 = dup3(r1, r2, 0x180000) write$selinux_load(r3, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "ed151a9a5c6761647f2c0db0e569bc3661be1778b30d2a5867c73b28996adb0912ce49e305459c9cd5cbee9d4f8d85e7a814f57a437c06224531cc00d9062560d43c763e3c6ffec405d10500df692764d827f89655da54ab8d5e76db881035e11559621c5bda5de516c3a5ee6f507fb62d82ebd5244185e59f6da54bd58f091282728e8d64e5a6cdc6337c15cd"}, 0x9d) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r5 = socket(0x10, 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendfile(r5, r4, &(0x7f0000000040)=0x100060, 0xa805) 03:56:16 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, 0x0}}, {{&(0x7f0000000200)=@in={0x2, 0x4e20}, 0x80, 0x0}}], 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) close(r1) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x303281, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8983, &(0x7f0000000180)={0x7, 'eql\x00', {0x2}, 0x7}) r4 = open(&(0x7f0000000100)='./file1\x00', 0x143660, 0x0) ftruncate(r4, 0x200004) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) setsockopt$sock_int(r2, 0x1, 0x13, &(0x7f0000000000)=0x877, 0x4) 03:56:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:16 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1772.041359] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14418 comm=syz-executor.5 03:56:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x113) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc01, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000001c0)="7255418c738ab9ab21a0aed46379030620") ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x302) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) 03:56:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1772.776485] audit: type=1400 audit(2000001377.103:1631): avc: denied { module_load } for pid=14442 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff}) write$input_event(r2, &(0x7f00000003c0)={{0x77359400}, 0x4, 0x0, 0x4}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 03:56:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x113) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc01, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000001c0)="7255418c738ab9ab21a0aed46379030620") ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x302) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) [ 1774.048003] audit: type=1400 audit(2000001378.373:1633): avc: denied { module_load } for pid=14499 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:18 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r3, 0x3, 0x0, 0x8020003) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r3, 0x0, 0x3) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1774.829635] audit: type=1400 audit(2000001379.153:1634): avc: denied { module_load } for pid=14531 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:19 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:20 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:20 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:20 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) getsockopt$inet_buf(r2, 0x0, 0x2b, &(0x7f0000000200)=""/193, &(0x7f0000000300)=0xc5) r3 = socket$unix(0x1, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000080)='lo\x00') r5 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x200201) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 03:56:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1776.421698] audit: type=1400 audit(2000001380.723:1635): avc: denied { module_load } for pid=14560 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:21 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:21 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:24 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000003c0)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x2d, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f3098240aafc145f70a877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000280)=""/233, &(0x7f0000000380)=0xe9) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x7, 0xe6, 0x40, 0x1}, {0x8, 0x5, 0x1, 0x7fffffff}, {0x1, 0x7, 0x9, 0x1f}, {0x20, 0x63, 0x9, 0x8}]}) 03:56:24 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001440)={0x0, 0xf09, 0x8}, 0xc) fcntl$setpipe(r2, 0x407, 0xd01) write(r1, &(0x7f0000000340), 0x41395527) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe1a}, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = dup(r4) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) write(r5, &(0x7f0000000180)="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", 0xfc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r5, 0x2cf, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000500)={0x5, 0x3, 0x9, 0xdf}, &(0x7f0000000100)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="fa26d3feb622e9562ae8f45ec2898159b52419e5db7c10faff90a358a50928ade9765b518a9e1393fea37c4df00608b96cdb6b577c099e8544168250b9494697e1fde4dc082dd3fe3777fbe40664426b16fc742378e91af6c9cbb5667dc3e46f064558c752f6ffff52b112e9f150431bac7cca0290b11e7b21e630bc1498d9fc3bd119368be18123a7ab353278c26e59981d31a54dddfdfc7340d1efd000be85997978dd12b5"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r6}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001d40)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xb, 0x6, &(0x7f0000001880)=ANY=[@ANYBLOB="85100000fbffffff18000000f80000000000000000000009000000000100000085100000fcffffff796100011f000000"], &(0x7f00000018c0)='syzkaller\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x2, [], r9, 0x3c, r1, 0x8, &(0x7f0000001900)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001940)={0x2, 0xc, 0x100, 0x8}, 0x10, r6, r8}, 0x78) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x18, 0x2, &(0x7f0000000140)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xbc, &(0x7f0000001200)=""/188, 0x41000, 0xb, [], 0x0, 0x19, r0, 0x8, &(0x7f00000012c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001300)={0x1, 0xd, 0x9, 0x9}, 0x10, r6, r11}, 0x78) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r12, 0xc080661a, &(0x7f00000013c0)={{0x0, 0x0, @identifier="671c4e4258bcfca4ffb44e8b848c41af"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r13 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r13, 0x0, 0x0, 0x4000000, 0x0, 0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r14, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) r15 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r15) read(r15, &(0x7f0000000200)=""/4096, 0x1000) ioctl$sock_FIOSETOWN(r14, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r14, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r14, 0x0, 0xfffffffffffffd7b, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r14, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x0) [ 1779.896117] audit: type=1400 audit(2000001384.223:1638): avc: denied { module_load } for pid=14634 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 [ 1780.010043] audit: type=1400 audit(2000001384.323:1639): avc: denied { prog_load } for pid=14633 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:56:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:24 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1780.127986] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. 03:56:24 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63301137603355f00a32ea5564b6acee75422d1a7c94faeb45c295a1a29ca16de8cb47838a46f173aef92206207ee82ca2fcab358bd610ca70f99eb2912d02edd149055c7d6bfaaeaf96bcc504b90ba15ad8d645cbe74f2cc640eb14ec944734bf2434eff32bf88697b1993a7c83dc82", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@rc, &(0x7f0000000240)=0x80, 0xc00) r2 = dup(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4104060}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffff8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x83f38cc44489b56d}, 0x4044045) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) inotify_init1(0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}]}, 0x38}, 0x1, 0x0, 0x0, 0x40070}, 0x8000) 03:56:24 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1780.601504] audit: type=1400 audit(2000001384.923:1640): avc: denied { module_load } for pid=14663 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:25 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:25 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="68b7"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000001c0)={'veth1_to_bridge\x00', 0x500}) [ 1780.676661] audit: type=1400 audit(2000001385.003:1641): avc: denied { create } for pid=14673 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:27 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff008}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) r2 = open(&(0x7f0000000180)='./bus/file0\x00', 0x80, 0x188) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) write$FUSE_IOCTL(r3, &(0x7f00000001c0)={0x20, 0x0, 0x8, {0x401, 0x4, 0x10001, 0x7}}, 0x20) fallocate(r2, 0x0, 0x0, 0x10000101) lseek(r2, 0x0, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x4) fdatasync(0xffffffffffffffff) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r6, 0x20, 0x0, 0xfffffeff000) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x2b) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:56:27 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x53, 0x0, 0x2, {}, {}, @period={0x5d, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0xfffffffffffffdfc}, 0x20) tkill(r0, 0x3b) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r2, 0x5, 0x2, 0x3f, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x362}, {&(0x7f0000000200)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYRES16, @ANYBLOB="0cda366f0001aeac441c095fadbbac2a7dfe5d4965c1dcbe2544be6077bf09765c3158c428c85ce62fdf9c7afde8633889807f1e684acb10efabd0c084464b6050a4ee8615659b"], 0x0, 0x49}, 0x20) tkill(r7, 0x3b) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) 03:56:27 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1783.326711] audit: type=1400 audit(2000001387.643:1642): avc: denied { module_load } for pid=14712 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:27 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xb8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 03:56:28 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(r1, 0x0, 0x81000009, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) capset(&(0x7f0000000240)={0x20080522, r2}, &(0x7f0000000280)={0xad1, 0x3, 0x7, 0x80000001, 0xffff}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r3) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000001c0)={0x0, 0xd352, 0xffffffff, 0x4a, 0x2}) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1784.016212] audit: type=1400 audit(2000001388.333:1643): avc: denied { module_load } for pid=14740 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:30 executing program 0: socket$inet6(0xa, 0x2, 0x0) init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:30 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="38112cdf"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1786.629438] audit: type=1400 audit(2000001390.953:1644): avc: denied { module_load } for pid=14768 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x100, 0x0, @mcast2, 0x3}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r3, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x0, 0x40800) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xffff}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$inet6(0xa, 0x3, 0x2) r11 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r11, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) socket(0xa, 0x1, 0x0) r12 = socket(0x1000000010, 0x400000400080803, 0x0) r13 = dup(r12) write$cgroup_int(r13, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) getsockopt$IP_VS_SO_GET_SERVICES(r10, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r14 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000400)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000400)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4, 0x400000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe75) setresuid(0x0, r15, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000000)=0xffffffffffffff89) syslog(0x9, &(0x7f0000000540)=""/125, 0xffffffffffffff7b) 03:56:31 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x0) close(r1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000001c0)=0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x10e09ec2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r4, 0x0, 0x3) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:31 executing program 0: init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1787.282136] audit: type=1400 audit(2000001391.603:1645): avc: denied { module_load } for pid=14799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1787.508712] audit: type=1400 audit(2000001391.833:1646): avc: denied { syslog } for pid=14794 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 03:56:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:34 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) waitid(0x1, 0x0, 0x0, 0x40000000, 0x0) 03:56:34 executing program 0: init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:34 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x55, 0x7fff, 0xfffd, {0x27}, {0x0, 0x4}, @period={0xb7, 0x0, 0x6, 0x0, 0x0, {}, 0x1, &(0x7f00000001c0)=[0xd31]}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)='net/softnet_stat\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, r1, 0x0, 0x1, &(0x7f0000000200)='\x00', r3}, 0x30) sched_getparam(r4, &(0x7f0000000280)) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1790.159072] audit: type=1400 audit(2000001394.483:1647): avc: denied { prog_load } for pid=14858 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:56:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000004d00)=""/152, &(0x7f0000005200)=0x98) 03:56:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:34 executing program 0: init_module(0x0, 0x0, &(0x7f0000000040)='cpusetbdevem1cpuset}*eth0(/security/vmnet0!]\x00') 03:56:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1790.161032] audit: type=1400 audit(2000001394.483:1648): avc: denied { module_load } for pid=14852 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 [ 1790.579587] audit: type=1400 audit(2000001394.903:1649): avc: denied { prog_load } for pid=14858 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 03:56:35 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 03:56:35 executing program 0: init_module(0x0, 0x0, &(0x7f0000000040)='cpusetbdevem1cpuset}*eth0(/security/vmnet0!]\x00') 03:56:37 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab"], 0x0, 0x3d}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:37 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) ptrace$getregs(0x100a5079ae868f1f, r0, 0x9, &(0x7f00000001c0)=""/217) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001480)=ANY=[@ANYBLOB="dfd2cd80fea16089bb3d9d96bcabfbd2e339aa772aac93cce8e436a0d4e064495a960bf36b0d9037ae8112356ebbe0e1c1e51e2a216ad39eacfcd50701a565f1e1a89d6bb1ab45761115618f1f479a1dc8f12c733ca592126941b8316a2cd3cf522a604485f1821486ef2fcad768ef1b26feb81389933fd7258d7430828db4847d190000000022837380ac3d1dd0654d52033f5100003e958ed29ee7b8000000"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40032) tkill(r0, 0x3b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000480), 0x1000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:37 executing program 5: r0 = gettid() recvmsg(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x13) 03:56:37 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:37 executing program 0: init_module(0x0, 0x0, &(0x7f0000000040)='cpusetbdevem1cpuset}*eth0(/security/vmnet0!]\x00') 03:56:37 executing program 0: init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xdffffffe}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef2faff324600000032006ce00001c47fffffff830cc640030000000000000001070b04e00000000009000b00108d99dd60e24a40caed0e"], 0x38) 03:56:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1793.900921] audit: type=1400 audit(2000001398.223:1651): avc: denied { create } for pid=14921 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:38 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="705423f63b42e2b2920b214908d0f029"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x7fc, &(0x7f0000000000)="7a4ca5f57e50530ca1e62cb5bee891c4495f04e8136ccf23d5b98fe71fa49dc98b48d39bb9c9184074381d1f1ab5f2d668f3d9c9ee75d8453f48fb2638c730ce") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1f) [ 1794.090759] audit: type=1400 audit(2000001398.413:1652): avc: denied { module_load } for pid=14937 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xdffffffe}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef2faff324600000032006ce00001c47fffffff830cc640030000000000000001070b04e00000000009000b00108d99dd60e24a40caed0e"], 0x38) [ 1794.257932] [ 1794.257935] =============================== [ 1794.257937] [ INFO: suspicious RCU usage. ] [ 1794.257944] 4.9.205-syzkaller #0 Not tainted [ 1794.257946] ------------------------------- [ 1794.257954] include/linux/inetdevice.h:205 suspicious rcu_dereference_check() usage! [ 1794.257956] [ 1794.257956] other info that might help us debug this: [ 1794.257956] [ 1794.257960] [ 1794.257960] rcu_scheduler_active = 2, debug_locks = 0 [ 1794.257965] 4 locks held by syz-executor.5/14946: [ 1794.257990] #0: (rcu_read_lock_bh){......}, at: [<0000000012eec780>] ip_finish_output2+0x20b/0x1280 [ 1794.258015] #1: (rcu_read_lock_bh){......}, at: [<00000000448a0597>] __dev_queue_xmit+0x1d4/0x1bd0 [ 1794.258033] #2: (_xmit_TUNNEL6#2){+.-...}, at: [<000000000d7f3205>] __dev_queue_xmit+0x1116/0x1bd0 [ 1794.258047] #3: (slock-AF_INET){+.-...}, at: [<00000000258baffa>] __icmp_send+0x48b/0x1420 [ 1794.258049] [ 1794.258049] stack backtrace: [ 1794.258057] CPU: 1 PID: 14946 Comm: syz-executor.5 Not tainted 4.9.205-syzkaller #0 [ 1794.258072] ffff8801a68e6dd8 ffffffff81b55e6b ffff8801a4965500 0000000000000000 [ 1794.258082] 0000000000000002 00000000000000cd ffff8801a023c740 ffff8801a68e6e08 [ 1794.258093] ffffffff81406997 ffff8801a4965558 ffff8801a68e6f28 ffff8801a1453300 [ 1794.258095] Call Trace: [ 1794.258111] [<00000000d6b9e05c>] dump_stack+0xcb/0x130 [ 1794.258123] [<000000000bb08d45>] lockdep_rcu_suspicious.cold+0x10a/0x149 [ 1794.258132] [<000000008edf6a38>] fib_compute_spec_dst+0x6c4/0xcc0 [ 1794.258139] [<000000009851b1a9>] ? fib_unmerge+0x4c0/0x4c0 [ 1794.258148] [<00000000b1117f47>] ? trace_hardirqs_on+0x10/0x10 [ 1794.258155] [<000000002d9d42d6>] ? __icmp_send+0x3c0/0x1420 [ 1794.258163] [<0000000055bb10c7>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1794.258171] [<0000000067e6def0>] ? mark_held_locks+0xb1/0x100 [ 1794.258180] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258189] [<00000000a72cd188>] __ip_options_echo+0x4be/0x13e0 [ 1794.258196] [<0000000004a5ba61>] __icmp_send+0x648/0x1420 [ 1794.258202] [<000000005a04c348>] ? __icmp_send+0xc07/0x1420 [ 1794.258210] [<00000000d90d1285>] ? icmpv4_xrlim_allow.isra.0+0x2d0/0x2d0 [ 1794.258218] [<00000000b1117f47>] ? trace_hardirqs_on+0x10/0x10 [ 1794.258225] [<0000000055bb10c7>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1794.258234] [<0000000068899a6b>] ? __ip_options_compile+0x668/0x13c0 [ 1794.258242] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258251] [<000000001ea25ff7>] ? ipv4_link_failure+0x410/0x850 [ 1794.258259] [<00000000ccf3066a>] ipv4_link_failure+0x460/0x850 [ 1794.258267] [<0000000042d96893>] ? ipv4_link_failure+0x32b/0x850 [ 1794.258274] [<00000000ebdd8b01>] ? rt_dst_alloc+0x450/0x450 [ 1794.258282] [<00000000ebdd8b01>] ? rt_dst_alloc+0x450/0x450 [ 1794.258290] [<000000009009fc83>] vti6_tnl_xmit+0xb08/0x17f0 [ 1794.258298] [<0000000043e3c1cb>] ? vti6_dellink+0x270/0x270 [ 1794.258307] [<000000002c6cacf3>] dev_hard_start_xmit+0x195/0x8b0 [ 1794.258316] [<00000000d35ce92e>] __dev_queue_xmit+0x11a3/0x1bd0 [ 1794.258324] [<00000000448a0597>] ? __dev_queue_xmit+0x1d4/0x1bd0 [ 1794.258332] [<0000000083b0c9a7>] ? __local_bh_enable_ip+0x6a/0xe0 [ 1794.258340] [<0000000090e7a705>] ? netdev_pick_tx+0x300/0x300 [ 1794.258348] [<00000000e8ea4c80>] ? __neigh_create+0x96e/0x1b30 [ 1794.258356] [<000000003870a57b>] dev_queue_xmit+0x18/0x20 [ 1794.258364] [<0000000092476a1a>] neigh_direct_output+0x16/0x20 [ 1794.258370] [<00000000c33b9fe5>] ip_finish_output2+0x6a2/0x1280 [ 1794.258378] [<0000000012eec780>] ? ip_finish_output2+0x20b/0x1280 [ 1794.258386] [<00000000af868e5c>] ? rcu_read_lock_held+0x9e/0xc0 [ 1794.258395] [<00000000a4d4857f>] ? nf_iterate+0x19e/0x310 [ 1794.258402] [<00000000c17f1860>] ? ip_send_check+0xb0/0xb0 [ 1794.258410] [<0000000055bb10c7>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1794.258418] [<00000000bd2d63d4>] ? nf_hook_slow+0x12f/0x1f0 [ 1794.258425] [<000000000e4c4aa2>] ip_finish_output+0x3c4/0xce0 [ 1794.258432] [<00000000694e29be>] ip_output+0x1ec/0x5b0 [ 1794.258439] [<00000000a46d8ba1>] ? ip_output+0x287/0x5b0 [ 1794.258446] [<00000000b93b2e6a>] ? ip_mc_output+0xcb0/0xcb0 [ 1794.258454] [<00000000512e5e2b>] ? nf_hook_slow+0x112/0x1f0 [ 1794.258462] [<00000000f5136cbc>] ? ip_fragment.constprop.0+0x210/0x210 [ 1794.258471] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258480] [<0000000056288292>] ? raw_sendmsg+0x1929/0x23e0 [ 1794.258488] [<00000000e6f60649>] raw_sendmsg+0x1c5c/0x23e0 [ 1794.258496] [<000000005d6ef683>] ? raw_sendmsg+0x1851/0x23e0 [ 1794.258505] [<0000000080de43cd>] ? avc_has_perm+0x164/0x3a0 [ 1794.258514] [<00000000516d8c27>] ? compat_raw_setsockopt+0xd0/0xd0 [ 1794.258522] [<00000000e3c59380>] ? __lock_acquire+0x5e0/0x4390 [ 1794.258530] [<0000000055bb10c7>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1794.258539] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258548] [<00000000b8118bc3>] ? trace_hardirqs_on_caller+0x582/0x5a0 [ 1794.258557] [<000000004c70fc26>] ? ip4_datagram_release_cb+0x970/0x970 [ 1794.258565] [<00000000a192281b>] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 1794.258574] [<00000000a8bd1e52>] ? avc_compute_av+0x2a6/0x610 [ 1794.258583] [<00000000e4bf901c>] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 1794.258591] [<0000000055bb10c7>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1794.258600] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258609] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258618] [<000000001e0ae01c>] ? check_preemption_disabled+0x3c/0x200 [ 1794.258626] [<00000000f91b2390>] ? inet_sendmsg+0x143/0x4d0 [ 1794.258634] [<000000006f58c118>] inet_sendmsg+0x202/0x4d0 [ 1794.258641] [<00000000b0639019>] ? inet_sendmsg+0x76/0x4d0 [ 1794.258649] [<000000001192260e>] ? inet_recvmsg+0x4d0/0x4d0 [ 1794.258657] [<000000004fee3e61>] sock_sendmsg+0xbe/0x110 [ 1794.258665] [<00000000cab4241f>] sock_write_iter+0x235/0x3d0 [ 1794.258673] [<000000001ee71cd0>] ? sock_sendmsg+0x110/0x110 [ 1794.258681] [<00000000ce25e01b>] ? iov_iter_init+0xaf/0x1d0 [ 1794.258689] [<000000006d511c5d>] __vfs_write+0x3c1/0x560 [ 1794.258697] [<00000000f20c2561>] ? bpf_fd_pass+0x270/0x270 [ 1794.258705] [<000000006300d743>] ? __vfs_read+0x550/0x550 [ 1794.258714] [<00000000c096f22f>] ? selinux_file_permission+0x85/0x470 [ 1794.258723] [<0000000046c3fbfb>] ? security_file_permission+0x8f/0x1f0 [ 1794.258731] [<0000000035d96ccf>] ? rw_verify_area+0xea/0x2b0 [ 1794.258738] [<00000000993d72db>] vfs_write+0x185/0x520 [ 1794.258746] [<00000000472bc147>] SyS_write+0x121/0x270 [ 1794.258753] [<000000005bed0372>] ? SyS_read+0x270/0x270 [ 1794.258762] [<00000000d9a82e75>] ? do_syscall_64+0x4a/0x5c0 [ 1794.258769] [<000000005bed0372>] ? SyS_read+0x270/0x270 [ 1794.258776] [<00000000c264a072>] do_syscall_64+0x1ad/0x5c0 [ 1794.258786] [<00000000d9581e89>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 03:56:41 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab"], 0x0, 0x3d}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x32, 0x829, 0x0, 0x0, {0x2, 0x1000000, 0x1000000}, [@nested={0x4}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 03:56:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:41 executing program 0: init_module(&(0x7f0000000180)='self\\\x00\xb0\xe9\x18#0\xac\x90H\xea\x90\x0f^\xf2\xf7\x02B=\xc2\xf3\xb6=\xfb$*&\xf9\x0f\xff\xa5\b\x89\xeb\xf6\x87R\xe5y\xd5\x11\x13^\xfch\xafZ\x89~)\x1d\x9e\xaat\xbfrC\x113#Z\x9a+\xf1\xa3\xba%O\xf8`dx\x89\xd7\xcb>\xc9l\x17\xaa\xe2_\t\x82\xe5\xb3\x8fu\xa0\xc2x8\x80H\x1b\xb9rM\xf8\xed\xdd5\xb2$\x97\x93]\xd9z\xf3\xd6;\xef\x02\xd6D\xa4`bzx\xae\x01\xd0=6\xf7\xc4\x8e^\xc2\x1d\xa1\xf2\xb69\x1d\xfe\xbdX\xd4\xe4\xb2\xc7S\xd3\vr\xa1\xe2\x01\x05\xb9$\x06\x00\xa6\x8a\x8eRz0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:41 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)="e669389f", 0x4}]) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) [ 1796.955981] audit: type=1400 audit(2000001401.273:1654): avc: denied { module_load } for pid=14975 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=0 03:56:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) [ 1797.228356] audit: type=1400 audit(2000001401.553:1655): avc: denied { create } for pid=14973 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 03:56:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:41 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) utimensat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {0x77359400}}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:44 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab"], 0x0, 0x3d}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:44 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80a00, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000200)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x12) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:44 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:44 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf6b301ffe8d3b1c63", @ANYBLOB="e62322cb1bc151de8e00000100004c117eb6009b3d81748d5286"], 0x0, 0x6b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 03:56:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:47 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb013375512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab", @ANYBLOB], 0x0, 0x3d}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:47 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x24e, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0xffffffffffffffa1}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82526bedb0135512f95c7784c6aaf28382730c7dbfc9754c881c5e87a64820546a1e9ed56adb3b91e7f1ffd7e4ab9c009bd6eec28c920b61a0bf7a301ffe8d3b1c6300", @ANYBLOB="e62322cb1bc1519860fcc40ed64028d77680cba532de8eddff00008d52860000000000fdffffff00"], 0x0, 0x79}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 03:56:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(0x0, 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x2) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r6, 0x0, 0x3) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:47 executing program 5: mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 03:56:47 executing program 5: mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 03:56:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode=']) 03:56:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x10e09ec2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2}) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd0194652b8f01cbc804e010e1147487265a46167f115924e04afda13aefecd3526193e6fca015efa9ce1141bf4ad8db233db664691ca5e0ed9b706a410c29e9cdf0000000000000000000000000fea5286623e35f5680c3be50af61f8821bbb69732ec1184b9e5435a59"], 0x90) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="000700c95336ccdcf4a4154041aaafb509c021cf04df37ccde646861202745edd8477342fa39ee63f746c48102457187f1136444a308d62333419c1fd71f5719040000003c290c7b3b46fce1071463cae8034e93b1358213c74910fdccdbfcf0da1f63bf860a3e371d7b000000000000009459c874930ec11d8561ee40cf5e10d1371d210ab568b41f049a851f52273a2709c15c83c835ef922e64ddaefac99a6ead1c5162a44f3f442dea5c85f056b4101cb4f9b9fe7889164bad4d72af96d339048d8e15630e4d405e82f3790592d764197d19995c497f722531adda6ca6c04e0b9cb61d0380f293a774a3bece95699e1e03e33d7bb120c081eab937c52d17be50c098f17f0eab4c41e0eec1ab00f0ebd1ae5c3fa9354ae6ab3ec18ef674213eb28de5"], 0x2) fallocate(r5, 0x3, 0x0, 0x8020003) writev(r5, &(0x7f0000000380)=[{0x0}], 0x1) lseek(r5, 0x0, 0x3) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000340)=""/94) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0xba, @remote, 0x120}, 0x1c) 03:56:47 executing program 5: mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 03:56:47 executing program 0: mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x61, &(0x7f0000000b00)=ANY=[@ANYBLOB='mode=00000000000000000000010,mode='])