200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:07 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:12 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:12 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x0, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce93032"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:12 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:12 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:12 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:12 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:13 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:14 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:14 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:14 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:14 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:14 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x0, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:14 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:14 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x0, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:14 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x0, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:16 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:16 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:16 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:16 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:16 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:16 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:17 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:17 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:17 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:23 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:23 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:23 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:23 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e3480"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:23 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:23 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:23 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:23 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:27 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:27 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:27 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:27 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:27 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:27 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:28 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:28 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
[ 1176.906591][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 1176.912923][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
18:03:28 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:28 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:32 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:32 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:32 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:32 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:32 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:32 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:33 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:33 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:33 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:33 executing program 0:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:35 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:35 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:35 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:35 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:35 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:35 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:35 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:35 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:35 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:35 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:36 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:36 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:37 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:37 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:37 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:37 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:37 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:42 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:42 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:42 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:42 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:42 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:42 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:42 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:44 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:44 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:44 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:44 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:44 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:44 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:44 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:44 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:44 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:44 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:44 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:45 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:45 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:45 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:49 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:49 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:49 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:49 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:49 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:49 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:49 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:49 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:50 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:50 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:50 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:50 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:54 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:55 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:55 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:55 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:55 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:55 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e34"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:55 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:55 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:55 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:55 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:55 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:55 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:56 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:56 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:56 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:56 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:57 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:57 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:57 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:57 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e34"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:57 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:57 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:03:57 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:58 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:58 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:58 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:03:58 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:03:58 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:00 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:00 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:00 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:00 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:00 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:00 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:00 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:01 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:02 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:02 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:02 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:02 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:02 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:05 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:05 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x16c, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @mark={0xc}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:05 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:05 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:05 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:05 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:05 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:05 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:05 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:05 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:05 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:11 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:11 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:11 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x19c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:11 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:11 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x0, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x19c, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:11 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x19c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x150, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tfcpad={0x8, 0x16, 0x100}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x150}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:11 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x19c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:11 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:11 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x148, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x148}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:15 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:15 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:15 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:15 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x148, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x148}}, 0x140080c0)
18:04:15 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:15 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x0, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:15 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x15c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:15 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x148, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x148}}, 0x140080c0)
18:04:15 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x148, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x148}}, 0x140080c0)
18:04:16 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x15c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:16 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x15c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x148, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff}, {}, {}, 0x70bd28}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in=@remote}]}, @mark={0xc}]}, 0x148}}, 0x0)
18:04:18 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:18 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:18 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x19c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:18 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:18 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:18 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x0, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:18 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:18 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:18 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:18 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:18 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:19 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:21 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:21 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:21 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:21 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:21 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x0, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:21 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:21 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:21 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:21 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:22 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(0x0, r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:22 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(0x0, r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:22 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(0x0, r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
getuid()
r3 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', 0x0, r3)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:23 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:23 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
getuid()
r3 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', 0x0, r3)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:23 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:24 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x0, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:24 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
getuid()
r3 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', 0x0, r3)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:26 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:26 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:26 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:26 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:26 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:26 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x0, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:27 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(0x0, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(0x0, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(0x0, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:27 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:28 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:28 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:28 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:28 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:28 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:28 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(0x0, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(0x0, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:29 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
[ 1238.321201][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 1238.327519][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
18:04:30 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:30 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:30 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:30 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:30 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:31 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:31 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:31 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0x0, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:31 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:31 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0x0, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:31 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0x0, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:31 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:32 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x0, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:32 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:32 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:32 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x0, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x0, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:33 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:33 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x0, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x0, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:33 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:33 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x0, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:34 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:34 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:34 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:34 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:34 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:34 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:35 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:35 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:35 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:35 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:36 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:36 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:36 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:36 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:36 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:36 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:37 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:37 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:38 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:38 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:38 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:38 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}, {}, {}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:42 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:42 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:42 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:42 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:42 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:43 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:43 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:43 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:45 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:45 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:45 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:45 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:45 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:46 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:46 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:46 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:46 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:46 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:50 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:50 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:50 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:50 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:50 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:50 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:51 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:51 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:51 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:51 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:51 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:52 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:53 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:53 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:53 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:53 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:53 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:53 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:53 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:53 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:54 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:54 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:54 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:58 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:59 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:59 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:04:59 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:59 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:59 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:04:59 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:59 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:59 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:04:59 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:00 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x160, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}]}, 0x160}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:00 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:00 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:01 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:01 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:01 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:01 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:01 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:01 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:01 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x14c, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:01 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:02 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:02 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:02 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:03 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:03 executing program 0:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:03 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:03 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:03 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:03 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x100, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}]}, 0x100}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:03 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:04 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:04 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x0, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:04 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x0, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:04 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x0, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:05 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:05 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x100, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}]}, 0x100}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:05 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:06 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:06 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:06 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:06 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x100, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}, [@tfcpad={0x8, 0x16, 0x100}]}, 0x100}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r2 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x0)
18:05:07 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r2 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x0)
18:05:07 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r1, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r2 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, 0x0, 0xa, 0xffffffffffffffff, 0x0)
18:05:07 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0x0, 0xffffffffffffffff, 0x0)
18:05:08 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0x0, 0xffffffffffffffff, 0x0)
18:05:08 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:08 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:08 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0x0, 0xffffffffffffffff, 0x0)
18:05:10 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:10 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0xf8, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}}, 0xf8}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:10 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:10 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:10 executing program 0:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:10 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:11 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0xf8, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}}, 0xf8}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:05:12 executing program 0:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:12 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:13 executing program 2:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:13 executing program 5:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:13 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0xf8, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}}, 0xf8}}, 0x140080c0)
18:05:14 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:14 executing program 0:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:16 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0xf8, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}}, 0xf8}}, 0x140080c0)
18:05:16 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:17 executing program 3:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0xf8, 0x16, 0x1, 0x70bd2b, 0x25dfdbfb, {{{@in6=@mcast2, @in=@private}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x6}}}}, 0xf8}}, 0x0)
18:05:17 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:18 executing program 3:
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:19 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:22 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:24 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:24 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:24 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:24 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:25 executing program 0:
openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:26 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:27 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:27 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
[ 1299.757047][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 1299.763371][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
18:05:32 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:43 executing program 3:
openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:43 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:43 executing program 0:
openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:43 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:43 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:43 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:44 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
[ 1312.879183][T28833] nfsd: failed to allocate reply cache
18:05:46 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:46 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:46 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:50 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:50 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:54 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:05:54 executing program 0:
openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:54 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:54 executing program 5:
openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:54 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:54 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:05:56 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:01 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:01 executing program 3:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:01 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:01 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:02 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:04 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:04 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:05 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:06 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:06 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:06 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:06 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:10 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x0, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:10 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x164, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x164}, 0x1, 0x0, 0x0, 0x40020}, 0x0)
r3 = getuid()
getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:10 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:10 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:10 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:10 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:10 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:10 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:16 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:17 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:18 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1b0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:18 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:18 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:18 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:19 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:22 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:24 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:25 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:31 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:31 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:31 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:32 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
[ 1361.199689][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 1361.206152][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
18:06:38 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:38 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:38 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:38 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x0, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:38 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:38 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:44 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:46 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:46 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1e4, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:46 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:46 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:46 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:46 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:46 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:54 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:06:54 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:06:54 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}}}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:06:54 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:07:05 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:05 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:05 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:05 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:05 executing program 5:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:05 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:09 executing program 3:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:13 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:13 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:13 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:14 executing program 5:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:15 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:15 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:15 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:16 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:17 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:17 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:07:17 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:18 executing program 3:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500), &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:23 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:24 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:24 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:24 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:26 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:26 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:27 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:27 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:27 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:29 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:29 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 3:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e5", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:33 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
[ 1422.629262][ T1229] ieee802154 phy0 wpan0: encryption failed: -22
[ 1422.635590][ T1229] ieee802154 phy1 wpan1: encryption failed: -22
18:07:35 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:36 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:36 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:37 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:44 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:45 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 3:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:07:58 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:00 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e3480"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:06 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:07 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:07 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:07 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:08 executing program 2:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:13 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x0, 0x0, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:08:13 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:13 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:13 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:13 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:13 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x70bd2b, 0x0, {{{@in6=@mcast2, @in=@private, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
18:08:15 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:08:16 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x80, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x0, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:08:16 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:17 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:18 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
open(0x0, 0x0, 0x49)
ptrace$setregs(0xd, 0x0, 0x0, 0x0)
getpid()
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'ip6gre0\x00', 0x0})
sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=@allocspi={0x1f0, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private=0xa010100, 0x4e22, 0x0, 0x4e22, 0x0, 0x0, 0x10, 0x0, 0x2f}, {@in6=@ipv4={'\x00', '\xff\xff', @remote}, 0x4d4, 0x32}, @in6=@private1, {0x0, 0x80000000, 0x6, 0x6, 0xffff, 0x1, 0x1ff}, {}, {0x0, 0x7}, 0x70bd28}, 0x0, 0x4}, [@tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x4c, 0x12, {{'aegis128l\x00'}}}, @srcaddr={0x14, 0xd, @in6=@private1}, @tmpl={0x84, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d5, 0xff}, 0xa, @in=@empty, 0x3504, 0xd0067232f66b95a3, 0x3, 0x8a, 0x2, 0xffffffff}]}, @mark={0xc, 0x15, {0x0, 0xffffffff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40020}, 0x140080c0)
r3 = getuid()
r4 = getgid()
lchown(&(0x7f0000000140)='./file0\x00', r3, r4)
perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x5, 0x81, 0xfd, 0x1, 0x0, 0x8, 0x10200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_config_ext, 0x848, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x100000001}, r1, 0xa, 0xffffffffffffffff, 0x0)
18:08:18 executing program 2:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce93032"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:22 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:22 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:22 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:22 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:22 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e80000000000000000"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:23 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
18:08:24 executing program 3:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:25 executing program 1:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x0, 0x277, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:30 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e80000000000000000"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:31 executing program 2:
bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58)
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200000, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000280)={0x9, @raw_data="485c8bec36d930750e3303fc5f85c9b9dcc4a2a30bb6f47ef9d74cc1e5ed817b90fca39610d40566ffdba832c6708ecd62adcf624c724e455d9bd1e52eddaec05b711e1c010b7609b9347010563b6c852d77bfe7c09430aa3808e746df30cc9a19e9230c706ff539c699fbe1143d07b18132f2208cb320981999bb30ba9b63c239f3fc1459a912cb37c2685dd0d68625919eabb4656e706a7a0fc8b8b41d631a92ba1320c49b46b35cbaa53da377ba5f6d5965d0d30170865aff4e29d1a9ab6569c86855d6edf8e9"})
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003c44, 0x802, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x2821, 0x3, 0x8, 0x8, 0x277, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:31 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
18:08:31 executing program 0:
openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB='\b'])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63c4b35fade17a9f85398655bd7cee0e217605f896bca608c8e4c4c4e3f63d7e29747709ecbd4eedccabf5effee795ef069c40", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:32 executing program 4:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
clone(0x42000, &(0x7f0000000500)="1a54f7706a0aa9fccb6d724b5bdc39e187d33b3e07faf6da2c95c5bc20e6dc610d61f90bfcabff84c95ed88ddc3798468ad81baa0e30d5f707215e84d05d10be3d6e0fa07f640416d1265d8b7b16daf2dd2a187a9ed2a811bf4d2621304a12ebc39f9361ba95a5e501b97dc43a2007601fbeddfc32cb30ab81cbe5103d300d5cdcc259775d16181adc1742785c96b81707d4507b83773d6336a3d53e63", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000380)="7bd939a731f313e41df2aec03d8bc35f16929cf900516db26d21a658ee1abfc5110c05babfdc987188b5c0f756ef20d3c5665fe797b129f70147ba6e6893c4373510897fb82ca518c018ffd8e02d7c28b78b66a8cea8262bd6646a342ae19582849e78e70aaf00d5fed2881be78855a583230c199524")
18:08:33 executing program 5:
r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0)
bind$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0))
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYBLOB="0800000000000000e800000000000000001100000005000001008f2221172a2fc0b45bdb000000000000020000800000080000000000000000000477d9b45583dc4737014b90bb3ce96bd2cd7d038789ffca8d910c21402cf92200ece692e723dc5b6325ebb47e5db9a39b4be608196aa792bbf33ce930328004ff02ad07d54c68cd4e"])
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
unshare(0x48000080)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
fanotify_init(0x0, 0x0)
[ 1482.219360][ T413] ==================================================================
[ 1482.227933][ T413] BUG: KASAN: null-ptr-deref in dst_release+0x26/0xe0
[ 1482.234787][ T413] Write of size 4 at addr 0000000000000240 by task syz-executor.0/413
[ 1482.242954][ T413]
[ 1482.245284][ T413] CPU: 1 PID: 413 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0
[ 1482.253893][ T413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1482.263971][ T413] Call Trace:
[ 1482.267258][ T413]
[ 1482.270199][ T413] dump_stack_lvl+0xcd/0x134
[ 1482.274814][ T413] kasan_report.cold+0x66/0xdf
[ 1482.279637][ T413] ? dst_cache_destroy+0xd1/0x190
[ 1482.284770][ T413] ? dst_release+0x26/0xe0
[ 1482.289204][ T413] kasan_check_range+0x13d/0x180
[ 1482.294177][ T413] dst_release+0x26/0xe0
[ 1482.298438][ T413] dst_cache_destroy+0xcb/0x190
[ 1482.303322][ T413] sit_init_net+0x7d8/0xaa0
[ 1482.307941][ T413] ? ipip6_tunnel_ctl+0x1040/0x1040
[ 1482.313172][ T413] ops_init+0xaf/0x470
[ 1482.317311][ T413] setup_net+0x40f/0xa30
[ 1482.321570][ T413] ? down_read_killable+0x1a7/0x480
[ 1482.326785][ T413] ? ops_init+0x470/0x470
[ 1482.331135][ T413] ? rcu_read_lock_sched_held+0x3a/0x70
[ 1482.336711][ T413] copy_net_ns+0x318/0x760
[ 1482.341155][ T413] create_new_namespaces+0x3f6/0xb20
[ 1482.346524][ T413] unshare_nsproxy_namespaces+0xc1/0x1f0
[ 1482.352183][ T413] ksys_unshare+0x445/0x920
[ 1482.356761][ T413] ? unshare_fd+0x1c0/0x1c0
[ 1482.361306][ T413] __x64_sys_unshare+0x2d/0x40
[ 1482.366089][ T413] do_syscall_64+0x35/0xb0
[ 1482.370540][ T413] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 1482.376452][ T413] RIP: 0033:0x7f0bf0047ae9
[ 1482.380881][ T413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1482.400600][ T413] RSP: 002b:00007f0beefbd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 1482.409039][ T413] RAX: ffffffffffffffda RBX: 00007f0bf015af60 RCX: 00007f0bf0047ae9
[ 1482.417025][ T413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048000080
[ 1482.425008][ T413] RBP: 00007f0bf00a1ff7 R08: 0000000000000000 R09: 0000000000000000
[ 1482.432990][ T413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 1482.440988][ T413] R13: 00007f0bf068eb2f R14: 00007f0beefbd300 R15: 0000000000022000
[ 1482.448994][ T413]
[ 1482.452021][ T413] ==================================================================
[ 1482.460085][ T413] Disabling lock debugging due to kernel taint
[ 1482.516707][ T413] Kernel panic - not syncing: panic_on_warn set ...
[ 1482.523328][ T413] CPU: 1 PID: 413 Comm: syz-executor.0 Tainted: G B 5.16.0-rc4-syzkaller #0
[ 1482.533353][ T413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1482.543419][ T413] Call Trace:
[ 1482.546701][ T413]
[ 1482.549809][ T413] dump_stack_lvl+0xcd/0x134
[ 1482.554417][ T413] panic+0x2b0/0x6dd
[ 1482.558379][ T413] ? __warn_printk+0xf3/0xf3
[ 1482.562989][ T413] ? preempt_schedule_common+0x59/0xc0
[ 1482.568469][ T413] ? dst_release+0x26/0xe0
[ 1482.572893][ T413] ? preempt_schedule_thunk+0x16/0x18
[ 1482.578344][ T413] ? trace_hardirqs_on+0x38/0x1c0
[ 1482.583393][ T413] ? trace_hardirqs_on+0x51/0x1c0
[ 1482.588423][ T413] ? dst_release+0x26/0xe0
[ 1482.592834][ T413] ? dst_release+0x26/0xe0
[ 1482.597244][ T413] end_report.cold+0x63/0x6f
[ 1482.601836][ T413] kasan_report.cold+0x71/0xdf
[ 1482.606608][ T413] ? dst_cache_destroy+0xd1/0x190
[ 1482.611651][ T413] ? dst_release+0x26/0xe0
[ 1482.616069][ T413] kasan_check_range+0x13d/0x180
[ 1482.621013][ T413] dst_release+0x26/0xe0
[ 1482.625265][ T413] dst_cache_destroy+0xcb/0x190
[ 1482.630127][ T413] sit_init_net+0x7d8/0xaa0
[ 1482.634640][ T413] ? ipip6_tunnel_ctl+0x1040/0x1040
[ 1482.639853][ T413] ops_init+0xaf/0x470
[ 1482.643926][ T413] setup_net+0x40f/0xa30
[ 1482.648209][ T413] ? down_read_killable+0x1a7/0x480
[ 1482.653428][ T413] ? ops_init+0x470/0x470
[ 1482.657758][ T413] ? rcu_read_lock_sched_held+0x3a/0x70
[ 1482.663315][ T413] copy_net_ns+0x318/0x760
[ 1482.667732][ T413] create_new_namespaces+0x3f6/0xb20
[ 1482.673019][ T413] unshare_nsproxy_namespaces+0xc1/0x1f0
[ 1482.678651][ T413] ksys_unshare+0x445/0x920
[ 1482.683160][ T413] ? unshare_fd+0x1c0/0x1c0
[ 1482.687667][ T413] __x64_sys_unshare+0x2d/0x40
[ 1482.692429][ T413] do_syscall_64+0x35/0xb0
[ 1482.696850][ T413] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 1482.702745][ T413] RIP: 0033:0x7f0bf0047ae9
[ 1482.707153][ T413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1482.726759][ T413] RSP: 002b:00007f0beefbd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 1482.735264][ T413] RAX: ffffffffffffffda RBX: 00007f0bf015af60 RCX: 00007f0bf0047ae9
[ 1482.743243][ T413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048000080
[ 1482.751214][ T413] RBP: 00007f0bf00a1ff7 R08: 0000000000000000 R09: 0000000000000000
[ 1482.759186][ T413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 1482.767157][ T413] R13: 00007f0bf068eb2f R14: 00007f0beefbd300 R15: 0000000000022000
[ 1482.775136][ T413]
[ 1482.778414][ T413] Kernel Offset: disabled
[ 1482.782731][ T413] Rebooting in 86400 seconds..