9b3723bff99254adb0b66169d7c0ff34884a8c88ddf7a825baa11f6d855e5de1e8240eeb473d779c6b3196ac0c7662d5428556a178183047a4d9d2c5dc8d576d090844dfaa8c3a1af4c6610cfdbf2a8beff397805a1d9553dc759c08755d73a74396a96a95af0b0c2a6e4ed0e308149d4b8f56f4f7ddc93e855268e48b63aeca93e3c4481a4946b455013eab6a45a9b171f68e70f03d329e55b22bab095bfd6cf7cc6ef8a4264bcf5e39467ab195ccc4f5dee0766ed429e48ab145bdc6fa6f78c7411bbf5f3a9e3e41eb72a102318be13aaa9d6e974cb95eb32c6cf1baebe7b7e382ff2018cba154a751e32023df97ece20d796ba8ec96928f4b6d7748d6d222de7b7b8d4cd84f4192ff28e0f733b8293c278d0cc635b4a36a538e49a9a5e09494ca28829859f9dfe342552a24cc843bd7ac07100d328e0a83bb75689159f32b433de9e3f789f85ed621c55821fd31d79d0f07804f1bb6c6812df509b20b0d4d669b2026f98827543161eab2f070d9f75e8b2834c6b05545fb5c2ff7b3108ec77b9931a864bf1e48440b6f1cce18bcbeed170340a7fdbd8860e5c7e08d089f927eff4b19b86620e86aa63178081bf37858a6f9c1e6509a89a6c0611c76f3384acd440734f110be22cc644160c93a85b2817ff75c44b9d5107ed8125730d81ba9dfd2bb297e4ab2d22c386a9bb328ebd0455dfa6f1489de4af3004d15d20b3d788a2808f8a469445cc3289f6be8f457d8e9fe55124254273deacac4b7f478a797b7f64b4c4bfb82b5d97541becf5be89bf0185c2b12591d6af92a0124b68a3c2372a0c1b5f1b59b868ea2e37c1c584a2d43b196ef66a87069728ac1bd8185f1dd0ec0cf0122a3c9778cf297ccdab14f9587e3240e1e91bdd1f550df60014e52b22b5d767f624e5cb08791f83c7e15e5c15cd24ab9b09506b31216c13baa2585c5b721e6bddcd208b25ed1f2b59fa7848f86167fa5375db9fd5e06beb6c58bb3370ef2018f60f15cc4e7e59154248b8083da14390f02ba4f33852548dcc4780529a655c801a58b6e2a21bd738c9cda999d906e53ab56a0d9188447d363f7b095e39cb4569e9550592c84397b0ebb9ed033477a9e77ccde5ddf1e18e65656586d2f2a05bdb44ce09269196d7bd6e98059e2325564e298f55a45e236670c9ab703cc1eef4874f6c3bdc4ccdc4a25045e771e30ec0c6aa288582ac1fc2a2c42fe8b18a8bf4ee3c7a5ea0368ab7bc8f139bf3e048bdd8536e74723db0b4c3172bb55d45fb075bc681861a1145a8af43c957a3a5e326d73b1f058e07bfcfa9986713138ff36b64243b8e3dcd4e76ef328ec0d12d4ceb225d9939899e043dba4c0acf4fb2ab64d693d6ea1fb6f38b9af379f8301c23736c84fb637582117ed4474a3430c2d1bbcadce10f2833ee44216e58126e230b9a6600f6313df1fe9adf0853c7d188ceb881c01879933bec5bfeb8ffb28ee8a86763cff3fda0fecf555e1f1f3e9ad875eaf9f887af11a435f89bf80dc1afe9f1161f26e11f111313bb4acbf052a39b4ed7ed32d5bd7767e4cd21a358687591a095e5cfec50ea0d509f21c3031d7013639d4b0c3f6e52b4351581320aad77516fdd18137eee3d4de2d536031a8c177345fd81980c99d20991cba0b9d5b4745fcbbeb981575835adb257f318e68b8fcdb2ff86f394d86d7935f6916f1c09e74fa96161ceab4226667a6a4e0892ac90be393dfd4d9930b159c7810a66600328cde4eb46bfafb30a74c3ea8cafd8a41ae6f48b6a906ac76beea29545b5a6a749fde67c57d32c4c414aa001fec3c6b56ee1427778332181562b102af3da819bbf32f0c90cf69cb84e73a6d8c7567433237e08c15d72e5bf4c1f58e597a7d8287b3b1c05da249d7be764f9c2c5e2795f5b1545713177ddc4c12ceb4b851874892caa81888d583f6646bbe51b0d9cacb6a141d60a7e3bd57e192ea4018bdbb00751e7bd4a1918f21c5f33429a7ae6b9dc9f17ad4b21e71da580d324a044cf08b8b03cc9932711eeb0f8f57002954b2912766353520e25bc33a4037255a73900576e9d8d78aaae7916848c3bd8bbc057ce947343979edc2c4c78b11d36f962a3858cd97b12906bc10c6d620d8b99361bbe4823d53fb1c746cac44f1c732d55077c4afe0dccc78a95f8ce2bbd4b2dacc8ba373d694ba09362691a90c08f338d8498e2bbcc65d4116daa1f5b68cb77fea9d04d6a96c65ce2e1bb6e42ff41cb414ea54f47f1744658d65a425e9d2d2de2dc08ea4df7e6e1bb34c6afd5a91a311df5e88366b0ac7227a91bb5bfc6cb54d8df4612fb620249a5d1d3a13317e3d30c4f3a9e4aa83ada7239757de8830321ab1a4bdfc6d1b643a1c703c1942cde9388a869c6902ecc7103062eb9938e6f6b3421ac53fe13b7c5fccf6517dcc391a5edb39fa417f83822fa76a740f5a39318ab56706bd13bd885e91dcbcbbaa2bd0ac56dce2004505cab1ccb699a5b86543913efbbf8d1d7fdab9c059316ff2dad446eeb8f1d13e28ec0091f7c7776a7108c13e09649fcfd93c05b62037104224ebb4ab6b009e09fcb1a4cd589d094fa0f98c63914571cf8c9b26e421e03e7dd7331d701d29e3256dd860c95ec30322c8bf0a4e6698b44d35c05b01f4148e4f3e3e2d3892506d1c94fb90d0876104fd7a8def8d364c9c5de29df93a9ff46c6eabaa6d5749f7802c46ef9e65d2047470cde3a483f73b9a60c06acbf328594d5cd1babf9d39686fbcbabdbe11caf68ba57f1c00ce8037e0c025f444ec7c75ba4df1388e0bd4d56d587a00f05621621fdf8d02e52a355e07a217774f7798fd6e5f62f6fc9b2a857291c55f077067cff0e541ca4c3a20ce6cd4f7243c8c14b3dbffcca2342cb9ff7c265fe0f994cfd898601c3f96d8162f37065f0b47d3cc47fe9cc4e4a8d6b4e34d675a7423972e790addcdd0f13194b234d773da846984e3aedcaf3723b4bc5edd32f8935737aaf81107276aa4d9549f5737107a4ccd65a3c4da65ae0f820306899109ae79ba9ee6d062f2190ab8ec162701c6ae21c772206d1df0b356290b61f952ab33a4c3dc95bae9261b850a6c10a0fc82151dba2cc624789d72089ed8fbaab1b535f821a74e43202fbfd8702bde37ee1ac6710a7cb8512d4890fb5f46b6a2fb87486ed697d87226f33ec6726d049b8d8d146e1d9044938e0ccdc7e8c42a089b4fceaad6cf7785ae918da8914926e28df60f6b87bc7112cece7a54c2c689d149ac17549f67adfcb2e68fe44ee1f9d0b792afadeff64da4c18a6b0ad0d2579eca988ea2a257dba237de4f9a1fdd6206faffa915f053da1336ae7a37de13a4f73a9225a73b032a9c041040761f64497c5d0da253b0790aeafbeb6e596ddb35dd7023210c4494ed1e35d326dc18f6a2d652cd0f6499f1bf28f55ea6c465c97a1023c36b6b8a547b600e178d16f77e7d2185fdd217d6b41b03822c439ba2244f360ec4f2de7c7d2fe8fd27a7c06f279d38d0721037fc46358d715e5ce87ad098eacce9bba7086b81b5cbbb381e219be31485898072fedaf4471dd150960079fd20d27d1b7a401204c55171a141bf146e9ad8f61bb1c3201cc46759511ad1f9b8e39d4bb411268e381691dacf48d4fab749f73df0f3d11521fbedfb648bc9244f524ab89305df52061d31c46f85403eda09b631d7f64bafc63b152edaeac4955ff3dc4a07197db054bf54f0eaa458ac8089fe6edeb1bbfeef1a58b6446d300ee06fcc3e07472389016b072b82466f8d023c3c8b6b04d88c8379d31a8bfd910c340a20d6e09683130c8cf6d65fe85917fe4193fe47d4f06df3481f453b31d3465bb02a195509c2ced5223aecc11cf0317b86567911c0441031fa5eab3729d365b12e328efbdad6d316988f8a5915c481079", 0x1000, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0xa121, r3) read(r1, &(0x7f0000000200)=""/225, 0xe1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000400)=0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) recvmmsg(r1, &(0x7f0000003540)=[{{&(0x7f0000000e40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}, {&(0x7f0000000fc0)=""/29, 0x1d}, {&(0x7f0000001000)=""/201, 0xc9}], 0x3, &(0x7f0000001140)=""/192, 0xc0, 0x7}, 0xfffffffffffff0e1}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/250, 0xfa}, {&(0x7f00000013c0)=""/19, 0x13}, {&(0x7f0000001400)=""/1, 0x1}], 0x4, &(0x7f0000001840)=""/4096, 0x1000, 0x8001}, 0x7fffffff}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/207, 0xcf}, {&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/216, 0xd8}, {&(0x7f00000017c0)=""/34, 0x22}], 0x5, &(0x7f00000028c0)=""/168, 0xa8}, 0xcd}, {{&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/242, 0xf2}, {&(0x7f0000002bc0)=""/9, 0x9}, {&(0x7f0000002c00)=""/248, 0xf8}, {&(0x7f0000002d00)=""/207, 0xcf}, {&(0x7f0000002e00)=""/180, 0xb4}], 0x7, &(0x7f0000002f40)=""/93, 0x5d, 0xb0}, 0x7}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/117, 0x75}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/77, 0x4d}, {&(0x7f0000003140)=""/159, 0x9f}], 0x4, &(0x7f0000003240)=""/236, 0xec, 0x9}, 0x2}, {{&(0x7f0000003340)=@sco, 0x80, &(0x7f0000003400)=[{&(0x7f00000033c0)=""/32, 0x20}], 0x1, &(0x7f0000003440)=""/232, 0xe8, 0x4}, 0x6205cde9}], 0x6, 0x0, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000d40)=[&(0x7f0000000480)='!\x00', &(0x7f00000004c0)='btrfs.', &(0x7f0000000500)='vboxnet1vboxnet0\x00', &(0x7f0000000540)='btrfs.', &(0x7f0000000580)='vboxnet1vboxnet0\x00', &(0x7f00000005c0)='proc+\x00', &(0x7f0000000d00)='vboxnet1vboxnet0\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='vboxnet1vboxnet0\x00', &(0x7f0000000dc0)='vboxnet1vboxnet0\x00']) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/162, &(0x7f0000000000)=0xa2) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000047c0), &(0x7f0000004800)=0x14) 08:06:26 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U-', 0x9}, 0x28, 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='security.selinux\x00', &(0x7f0000000240), 0xfe5f, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100), 0x0, 0x0) 08:06:26 executing program 0: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000036c0)=ANY=[], &(0x7f0000000340)=""/140, 0x8c) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x519}], 0x1, 0x0, 0x0, 0x800}, 0x44804) write(r0, &(0x7f0000000b80)="411dc00ed79e9dd7ecbd2f6c422434de13189612424e5a04abb8f5cf56b960a1628bea0f9b3682cac225512596c0f3340c887935ccd76c25384e6aeb961316f80434077a6f40dab741ff262489551814dc", 0x51) bind$inet(r0, &(0x7f0000000b40)={0x2, 0x4e24, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) lsetxattr(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)=@random={'system.', '!\x00'}, &(0x7f0000000c80)='!\x00', 0x2, 0x1) r2 = add_key(&(0x7f0000000cc0)='big_key\x00', &(0x7f00000036c0)={'syz', 0x1}, &(0x7f0000003700)="daf3510c", 0x4, 0x0) r3 = add_key(&(0x7f0000003740)='big_key\x00', &(0x7f0000003780)={'syz', 0x3}, &(0x7f00000037c0)="8b42ed46932db382943d4aa89d9d6e8321ff1a2244d440ebec3951027b898905874593b1c798862e6ebb83d029a562cf97193cbc0d5f45097ad3a5ac2837a99a125e9762c2ef1da80b2df13adce3edab0831f947aca587e358f4cc4f8b35069989ef18ae0c3e9a9271837d989c25c65c7468ffe282a5e3ee0486887a7081a7bfc2b730bb4a363e33df2667b77bc97ef340130d95db4c87fb2d8cf3981321b8af035d0e05324f82fc47acf5ae8f7fea97bfd357757f5af04c40768bd2a34950ca68f5d9f8b66e20c4f19c824e461860f598c82cd2c183da986ff67966cee56e002df3d21bcb1142ecaeddff839ee2813142df0799e33f07598044e2621dd446632ac46594b602cf82cbb94a3e5e4a20945e3525052f107aa33e7caf6daca06a805515db36d39e4acda0f6401f7bdacbc0a524b5a394d6ce6182af6f8e9cec161d6d4227542096dfd40331396dab0fdd518b125ae6a4521ec04041a353c3fa88142c4736c5bcd8926a487d2bc61d8601de489f95a04d9cf4161d443c8aae820291d2c9a5b93e31e7621d745e7dcf026144edaad53a59ed56c41cb49700c9decff34f74b4907b65431eaa9f8c5e6b1e8ff26ee781f6822a98e35be77658b4d2a8b12bf47d62f7205025c195e1e1890b7fc60eb024056071902d61ab23ea8b9e448e650d9fd0521a556387750ffbc954730057b6d22ab95dda0a26a1daf7b91518372449a72a4b0f2c917b73088cab322ee82107cbb7a8ec0c06f6b9042d627a3cc6ad8dec1d56c0b6e864272e16105fe37477a5efca749814f7fcdf68926a82dea6b3f631aa639f14a3e8537a3b69505e700af555b727bdbf5c506a919733a1b269937859ed1457d5b2fe8be941f1317da91447697a99fdc47fa3997fa750a68c8924dc505c38d4cb63d2a0146630115199ab0e85b318843a6136c22187b5789c73a2850c9829779661f10eef74e4b689d82548bc613502489b1377ef179372b719e286968d341cbd0966d97f137e7b2e1c192ad6ff07da0f54ac4910516230cb417d3e6b6f3b9ea46f54c9629fb30a9284a173a27a1dd91683ef7a0e231c8104765e66bb05793b5921b71b4f6a77a3acd70a7cbe27853b5c6c070645acd5fcfd97defbff8225c9b0fda378074b46c370d48eda60aea0305825dede8dfcfb7e6011684ac0bbdbb784c2d4fb620675ebb32186ba9015ea6bf894e8cab5980fafb4893570890bb9f6408b169ba9efe25336109eb97e88fd8efa132eaef895e25cb2d2bfef7e3d19e3cb6475e4b8fb811c6631aed97fe53307354d12422fb152472fbfdcd363a549f8593d92702fcc9793ca2886fc6cb0eb4738d7a29562b26e6dcbb61f5b0d793ac76c90193e3e0c9e955100b87727e3292833db4ea3642e95810d01e6bfe41531ee3d2cc90bc7df54c474b8eb5378c55d9163c124ebca2c7d83fde1f956031de060f8c0227bd87a41ac74725ddf5c3e30111eb5082e74043c1f55d8cb87deb548d5611d02e9e7ceb755c20b47030060f4b6f612a9c76393ea8b51d5e12daab3c8f693e09beed956516e7fb7c73b747919b6c2ab63aff21c1b8e22d76a2ee5db2516fc7307f05760cb3e98d590012731f7c5fd36441bc90b6a1e19e49e8bd7d549b3765f3a5dc508f5c6d12978afbaf2d52edbc744dd77237d5fc31928df84e38447aa1da08d7e9802b1b739b4318b8a630855aaa72408636e49fc5ea1dfea8008c0fa36628cd753e3ec17dffe89d6a677ff47102a99e68eb32a1e75dd09d45fb7f48c067c6309953fe71bb8106c72fd9a6b5074eeea937d58f038163df8eba23cf4f355d01360aee2075b232ab5b8392029fc0b3712936cecf9c656f9f36c915aee1b858f8842f27f6b3c6e03a287e690582a0e67123a4aff82964049b3723bff99254adb0b66169d7c0ff34884a8c88ddf7a825baa11f6d855e5de1e8240eeb473d779c6b3196ac0c7662d5428556a178183047a4d9d2c5dc8d576d090844dfaa8c3a1af4c6610cfdbf2a8beff397805a1d9553dc759c08755d73a74396a96a95af0b0c2a6e4ed0e308149d4b8f56f4f7ddc93e855268e48b63aeca93e3c4481a4946b455013eab6a45a9b171f68e70f03d329e55b22bab095bfd6cf7cc6ef8a4264bcf5e39467ab195ccc4f5dee0766ed429e48ab145bdc6fa6f78c7411bbf5f3a9e3e41eb72a102318be13aaa9d6e974cb95eb32c6cf1baebe7b7e382ff2018cba154a751e32023df97ece20d796ba8ec96928f4b6d7748d6d222de7b7b8d4cd84f4192ff28e0f733b8293c278d0cc635b4a36a538e49a9a5e09494ca28829859f9dfe342552a24cc843bd7ac07100d328e0a83bb75689159f32b433de9e3f789f85ed621c55821fd31d79d0f07804f1bb6c6812df509b20b0d4d669b2026f98827543161eab2f070d9f75e8b2834c6b05545fb5c2ff7b3108ec77b9931a864bf1e48440b6f1cce18bcbeed170340a7fdbd8860e5c7e08d089f927eff4b19b86620e86aa63178081bf37858a6f9c1e6509a89a6c0611c76f3384acd440734f110be22cc644160c93a85b2817ff75c44b9d5107ed8125730d81ba9dfd2bb297e4ab2d22c386a9bb328ebd0455dfa6f1489de4af3004d15d20b3d788a2808f8a469445cc3289f6be8f457d8e9fe55124254273deacac4b7f478a797b7f64b4c4bfb82b5d97541becf5be89bf0185c2b12591d6af92a0124b68a3c2372a0c1b5f1b59b868ea2e37c1c584a2d43b196ef66a87069728ac1bd8185f1dd0ec0cf0122a3c9778cf297ccdab14f9587e3240e1e91bdd1f550df60014e52b22b5d767f624e5cb08791f83c7e15e5c15cd24ab9b09506b31216c13baa2585c5b721e6bddcd208b25ed1f2b59fa7848f86167fa5375db9fd5e06beb6c58bb3370ef2018f60f15cc4e7e59154248b8083da14390f02ba4f33852548dcc4780529a655c801a58b6e2a21bd738c9cda999d906e53ab56a0d9188447d363f7b095e39cb4569e9550592c84397b0ebb9ed033477a9e77ccde5ddf1e18e65656586d2f2a05bdb44ce09269196d7bd6e98059e2325564e298f55a45e236670c9ab703cc1eef4874f6c3bdc4ccdc4a25045e771e30ec0c6aa288582ac1fc2a2c42fe8b18a8bf4ee3c7a5ea0368ab7bc8f139bf3e048bdd8536e74723db0b4c3172bb55d45fb075bc681861a1145a8af43c957a3a5e326d73b1f058e07bfcfa9986713138ff36b64243b8e3dcd4e76ef328ec0d12d4ceb225d9939899e043dba4c0acf4fb2ab64d693d6ea1fb6f38b9af379f8301c23736c84fb637582117ed4474a3430c2d1bbcadce10f2833ee44216e58126e230b9a6600f6313df1fe9adf0853c7d188ceb881c01879933bec5bfeb8ffb28ee8a86763cff3fda0fecf555e1f1f3e9ad875eaf9f887af11a435f89bf80dc1afe9f1161f26e11f111313bb4acbf052a39b4ed7ed32d5bd7767e4cd21a358687591a095e5cfec50ea0d509f21c3031d7013639d4b0c3f6e52b4351581320aad77516fdd18137eee3d4de2d536031a8c177345fd81980c99d20991cba0b9d5b4745fcbbeb981575835adb257f318e68b8fcdb2ff86f394d86d7935f6916f1c09e74fa96161ceab4226667a6a4e0892ac90be393dfd4d9930b159c7810a66600328cde4eb46bfafb30a74c3ea8cafd8a41ae6f48b6a906ac76beea29545b5a6a749fde67c57d32c4c414aa001fec3c6b56ee1427778332181562b102af3da819bbf32f0c90cf69cb84e73a6d8c7567433237e08c15d72e5bf4c1f58e597a7d8287b3b1c05da249d7be764f9c2c5e2795f5b1545713177ddc4c12ceb4b851874892caa81888d583f6646bbe51b0d9cacb6a141d60a7e3bd57e192ea4018bdbb00751e7bd4a1918f21c5f33429a7ae6b9dc9f17ad4b21e71da580d324a044cf08b8b03cc9932711eeb0f8f57002954b2912766353520e25bc33a4037255a73900576e9d8d78aaae7916848c3bd8bbc057ce947343979edc2c4c78b11d36f962a3858cd97b12906bc10c6d620d8b99361bbe4823d53fb1c746cac44f1c732d55077c4afe0dccc78a95f8ce2bbd4b2dacc8ba373d694ba09362691a90c08f338d8498e2bbcc65d4116daa1f5b68cb77fea9d04d6a96c65ce2e1bb6e42ff41cb414ea54f47f1744658d65a425e9d2d2de2dc08ea4df7e6e1bb34c6afd5a91a311df5e88366b0ac7227a91bb5bfc6cb54d8df4612fb620249a5d1d3a13317e3d30c4f3a9e4aa83ada7239757de8830321ab1a4bdfc6d1b643a1c703c1942cde9388a869c6902ecc7103062eb9938e6f6b3421ac53fe13b7c5fccf6517dcc391a5edb39fa417f83822fa76a740f5a39318ab56706bd13bd885e91dcbcbbaa2bd0ac56dce2004505cab1ccb699a5b86543913efbbf8d1d7fdab9c059316ff2dad446eeb8f1d13e28ec0091f7c7776a7108c13e09649fcfd93c05b62037104224ebb4ab6b009e09fcb1a4cd589d094fa0f98c63914571cf8c9b26e421e03e7dd7331d701d29e3256dd860c95ec30322c8bf0a4e6698b44d35c05b01f4148e4f3e3e2d3892506d1c94fb90d0876104fd7a8def8d364c9c5de29df93a9ff46c6eabaa6d5749f7802c46ef9e65d2047470cde3a483f73b9a60c06acbf328594d5cd1babf9d39686fbcbabdbe11caf68ba57f1c00ce8037e0c025f444ec7c75ba4df1388e0bd4d56d587a00f05621621fdf8d02e52a355e07a217774f7798fd6e5f62f6fc9b2a857291c55f077067cff0e541ca4c3a20ce6cd4f7243c8c14b3dbffcca2342cb9ff7c265fe0f994cfd898601c3f96d8162f37065f0b47d3cc47fe9cc4e4a8d6b4e34d675a7423972e790addcdd0f13194b234d773da846984e3aedcaf3723b4bc5edd32f8935737aaf81107276aa4d9549f5737107a4ccd65a3c4da65ae0f820306899109ae79ba9ee6d062f2190ab8ec162701c6ae21c772206d1df0b356290b61f952ab33a4c3dc95bae9261b850a6c10a0fc82151dba2cc624789d72089ed8fbaab1b535f821a74e43202fbfd8702bde37ee1ac6710a7cb8512d4890fb5f46b6a2fb87486ed697d87226f33ec6726d049b8d8d146e1d9044938e0ccdc7e8c42a089b4fceaad6cf7785ae918da8914926e28df60f6b87bc7112cece7a54c2c689d149ac17549f67adfcb2e68fe44ee1f9d0b792afadeff64da4c18a6b0ad0d2579eca988ea2a257dba237de4f9a1fdd6206faffa915f053da1336ae7a37de13a4f73a9225a73b032a9c041040761f64497c5d0da253b0790aeafbeb6e596ddb35dd7023210c4494ed1e35d326dc18f6a2d652cd0f6499f1bf28f55ea6c465c97a1023c36b6b8a547b600e178d16f77e7d2185fdd217d6b41b03822c439ba2244f360ec4f2de7c7d2fe8fd27a7c06f279d38d0721037fc46358d715e5ce87ad098eacce9bba7086b81b5cbbb381e219be31485898072fedaf4471dd150960079fd20d27d1b7a401204c55171a141bf146e9ad8f61bb1c3201cc46759511ad1f9b8e39d4bb411268e381691dacf48d4fab749f73df0f3d11521fbedfb648bc9244f524ab89305df52061d31c46f85403eda09b631d7f64bafc63b152edaeac4955ff3dc4a07197db054bf54f0eaa458ac8089fe6edeb1bbfeef1a58b6446d300ee06fcc3e07472389016b072b82466f8d023c3c8b6b04d88c8379d31a8bfd910c340a20d6e09683130c8cf6d65fe85917fe4193fe47d4f06df3481f453b31d3465bb02a195509c2ced5223aecc11cf0317b86567911c0441031fa5eab3729d365b12e328efbdad6d316988f8a5915c481079", 0x1000, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0xa121, r3) read(r1, &(0x7f0000000200)=""/225, 0xe1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000400)=0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) recvmmsg(r1, &(0x7f0000003540)=[{{&(0x7f0000000e40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}, {&(0x7f0000000fc0)=""/29, 0x1d}, {&(0x7f0000001000)=""/201, 0xc9}], 0x3, &(0x7f0000001140)=""/192, 0xc0, 0x7}, 0xfffffffffffff0e1}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/250, 0xfa}, {&(0x7f00000013c0)=""/19, 0x13}, {&(0x7f0000001400)=""/1, 0x1}], 0x4, &(0x7f0000001840)=""/4096, 0x1000, 0x8001}, 0x7fffffff}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/207, 0xcf}, {&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/216, 0xd8}, {&(0x7f00000017c0)=""/34, 0x22}], 0x5, &(0x7f00000028c0)=""/168, 0xa8}, 0xcd}, {{&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/242, 0xf2}, {&(0x7f0000002bc0)=""/9, 0x9}, {&(0x7f0000002c00)=""/248, 0xf8}, {&(0x7f0000002d00)=""/207, 0xcf}, {&(0x7f0000002e00)=""/180, 0xb4}], 0x7, &(0x7f0000002f40)=""/93, 0x5d, 0xb0}, 0x7}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/117, 0x75}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/77, 0x4d}, {&(0x7f0000003140)=""/159, 0x9f}], 0x4, &(0x7f0000003240)=""/236, 0xec, 0x9}, 0x2}, {{&(0x7f0000003340)=@sco, 0x80, &(0x7f0000003400)=[{&(0x7f00000033c0)=""/32, 0x20}], 0x1, &(0x7f0000003440)=""/232, 0xe8, 0x4}, 0x6205cde9}], 0x6, 0x0, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000d40)=[&(0x7f0000000480)='!\x00', &(0x7f00000004c0)='btrfs.', &(0x7f0000000500)='vboxnet1vboxnet0\x00', &(0x7f0000000540)='btrfs.', &(0x7f0000000580)='vboxnet1vboxnet0\x00', &(0x7f00000005c0)='proc+\x00', &(0x7f0000000d00)='vboxnet1vboxnet0\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='vboxnet1vboxnet0\x00', &(0x7f0000000dc0)='vboxnet1vboxnet0\x00']) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/162, &(0x7f0000000000)=0xa2) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000047c0), &(0x7f0000004800)=0x14) 08:06:26 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000036c0)=ANY=[], &(0x7f0000000340)=""/140, 0x8c) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000600)="80f17a0b8c8970cad4e7c2198c830f262255157995a738328a6ea456e2363942b6223ced8e1d157847f0c1b27a6f790486384b94faefd0dfba2444691133054cc3c8e8e0c3448446a3c2b9f6f110a48d3902d829438729dc7496c17992daebf777fcec616e2ab5ee4386fc35ddb3c5be77d95c0fffaf93cd81c953d311d52830de1d0e9e0df27d08c3fd370198119340781d16aafdfe831593becee6a47cb0fc059d70333ded95e2eb745ff068798a7f26f16839020454432ad0db8fad8c6f345d112e5a6324307d2828ab93a8466da7e80f1a9a4e52857001931223755f7cfb153a98e80cf6b91cf3b9d6634bb2a11f78cc4b3e54a5ac1f17ba23f8eae550c41ab7fcfb549b1791b61093ef140b2b4974e454654ecf5d28797058e196c632fe4f8b71816b2e3c766121499ac4ccdabdbb8c2c57d4a2b5a2e123d0eba31d36285709a22bbdd00e1da947b486f23cdf7453fb1ea5a4775d4dd315e6555ca87c6326efe9bf74b8daecd441eec2ac284d3c062ca8db46acd4e54eafd2cfe5871feac2ba09f31813b44eb3de3515a7b702ee6e0858841ebaddbc8a01d8bfc444c7c0d5d9829a7f61063e31f4fbdef237ff9d4809dcb115c5ffd86af35d1d2edadae8d793a6a0b37adff41ba5a7188e3d46764a5f242fc20b3f44ec5d18ff251b231135c066b9ab5b889b0774613a5dc7a6d6ad5e2d6d095b610f674be6ac519c7d19be29ddccdfe3bf7ea744230ff61d1f3657407d2cc64a4a432cb843d91f98e39f96f47fbd513a12d4a40bd7e15b5910792bea8f197731950245000a99787b4d267c70852d07c94c280f17934214c64677bb5c3c6a996f4d20fbf54f520ed7575f66cd07aa2e14423134962f73d86bce9eb93c697f66adeb655b7898d1f9e66a045f421937f85c251cd510614d3f5f8ca6230d4e04e3e9f36f73f8484749ac03c6b657e81cc9a201817e44f8cad068d100c2ae02c521a83d7bd5f26d8eb9de2f769a356a4adbcbb4425f66293ad1f49851c233a3a64f474860bd6e78b9edb66e259358fd322140140341245fb111b95c9b2e4b6b63b82e711b59d65b06b70ec3ac731d916a5b9f3d4c84c63c4e25db1ca40b2662e0d03327ea4f82d4d19b65527d48859ae051f6c7726bd84ceb1f8c40cbaeb08ecd0fd6aa1367b62f4c41d85525b4c4d39c0f314d88bb1c63554c199bc5f2c8aed9d2b4e864e232107e28658a612fb8589105b00004308fe4635e3a20cc44ba33557a8c3dbba28d78c5390b6a1e292bbdd4ada2244c87a4135c9dd3a426908b9aeed9adff063fa6fc056b7587e3afc5390bd5f1069db6277e3a84282157c1d4fc8c9326efd496659955724cccf7f0ac6d767dfc9511bcc3b51ab7061a35a24310b1f7b0b003f132360fc2f0df5a0ccc27bcba0395fc3ff3842071f0a4dc2debdc1becfffc9f0519e323f5d9793274b0e5eac4be6da21055b44e3db6ab0bb550cfa7305a78a840e1e46b29ffc4f337b1c6165aaf284290f69a620fe2dc9cdc6db45dec913ab4d083d77207439e758c156a39299872b288c9f18d13e8ae0284e132ddf77140b4d4a1c8b5f2c93359efcf948dbd92338fa90641069b479ce2a2ade41edb50f32dbc746903fc41d9b6c0c478848f8c60e1c77a6fd41f4a859609b944350543a4694c913d8cd8ebf9209615b9a1b726d50e1ed2e810ccb2ed4340eb30d27b22120292057a8c11dc888825c97f2ba1d558246bc5d972c141eb8633592bd3246962f08a5595ae01220b7a78bc7a090d1ccc8613537f766e4e9602685bd00aa5ad7309f5883bcecd75b65b341508a5beee817be3fde4b38cc6da3be077760693023a4295", 0x519}], 0x1, 0x0, 0x0, 0x800}, 0x44804) write(r0, &(0x7f0000000b80)="411dc00ed79e9dd7ecbd2f6c422434de13189612424e5a04abb8f5cf56b960a1628bea0f9b3682cac225512596c0f3340c887935ccd76c25384e6aeb961316f80434077a6f40dab741ff262489551814dc", 0x51) bind$inet(r0, &(0x7f0000000b40)={0x2, 0x4e24, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) lsetxattr(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)=@random={'system.', '!\x00'}, &(0x7f0000000c80)='!\x00', 0x2, 0x1) r2 = add_key(&(0x7f0000000cc0)='big_key\x00', &(0x7f00000036c0)={'syz', 0x1}, &(0x7f0000003700)="daf3510c", 0x4, 0x0) r3 = add_key(&(0x7f0000003740)='big_key\x00', &(0x7f0000003780)={'syz', 0x3}, &(0x7f00000037c0)="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", 0x1000, 0xfffffffffffffff9) keyctl$negate(0xd, r2, 0xa121, r3) read(r1, &(0x7f0000000200)=""/225, 0xe1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x1) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000400)=0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) recvmmsg(r1, &(0x7f0000003540)=[{{&(0x7f0000000e40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}, {&(0x7f0000000fc0)=""/29, 0x1d}, {&(0x7f0000001000)=""/201, 0xc9}], 0x3, &(0x7f0000001140)=""/192, 0xc0, 0x7}, 0xfffffffffffff0e1}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}, {&(0x7f00000012c0)=""/250, 0xfa}, {&(0x7f00000013c0)=""/19, 0x13}, {&(0x7f0000001400)=""/1, 0x1}], 0x4, &(0x7f0000001840)=""/4096, 0x1000, 0x8001}, 0x7fffffff}, {{&(0x7f0000001480)=@alg, 0x80, &(0x7f0000002840)=[{&(0x7f0000001500)=""/126, 0x7e}, {&(0x7f0000001580)=""/207, 0xcf}, {&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/216, 0xd8}, {&(0x7f00000017c0)=""/34, 0x22}], 0x5, &(0x7f00000028c0)=""/168, 0xa8}, 0xcd}, {{&(0x7f0000002980)=@hci, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a00)=""/44, 0x2c}, {&(0x7f0000002a40)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/242, 0xf2}, {&(0x7f0000002bc0)=""/9, 0x9}, {&(0x7f0000002c00)=""/248, 0xf8}, {&(0x7f0000002d00)=""/207, 0xcf}, {&(0x7f0000002e00)=""/180, 0xb4}], 0x7, &(0x7f0000002f40)=""/93, 0x5d, 0xb0}, 0x7}, {{0x0, 0x0, &(0x7f0000003200)=[{&(0x7f0000002fc0)=""/117, 0x75}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/77, 0x4d}, {&(0x7f0000003140)=""/159, 0x9f}], 0x4, &(0x7f0000003240)=""/236, 0xec, 0x9}, 0x2}, {{&(0x7f0000003340)=@sco, 0x80, &(0x7f0000003400)=[{&(0x7f00000033c0)=""/32, 0x20}], 0x1, &(0x7f0000003440)=""/232, 0xe8, 0x4}, 0x6205cde9}], 0x6, 0x0, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000d40)=[&(0x7f0000000480)='!\x00', &(0x7f00000004c0)='btrfs.', &(0x7f0000000500)='vboxnet1vboxnet0\x00', &(0x7f0000000540)='btrfs.', &(0x7f0000000580)='vboxnet1vboxnet0\x00', &(0x7f00000005c0)='proc+\x00', &(0x7f0000000d00)='vboxnet1vboxnet0\x00'], &(0x7f0000000e00)=[&(0x7f0000000d80)='vboxnet1vboxnet0\x00', &(0x7f0000000dc0)='vboxnet1vboxnet0\x00']) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000000c0)=""/162, &(0x7f0000000000)=0xa2) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000047c0), &(0x7f0000004800)=0x14) 08:06:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:26 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) ptrace$setregset(0x2, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)}) 08:06:26 executing program 3: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:26 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:27 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:27 executing program 3: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:27 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:27 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:27 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:27 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:27 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 3: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:28 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:28 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:28 executing program 3: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:29 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:29 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:06:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x11, &(0x7f0000000080)={@dev, @link_local, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "e0"}}}}}, &(0x7f0000000000)) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, &(0x7f0000000040)) 08:06:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 2: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 5: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x90c) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x200) 08:06:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 2: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xfffffffffffffffd, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) 08:06:30 executing program 5: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:30 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xfffffffffffffffd, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) 08:06:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 08:06:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ce8000)={0x9, 0x1, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000100), 0xfffffffffffffffd}, 0x18) 08:06:30 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xfffffffffffffffd, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) 08:06:30 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xfffffffffffffffd, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) 08:06:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={'syz_tun\x00', @ifru_flags}) 08:06:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:30 executing program 2: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 5: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400400000005, &(0x7f00000001c0)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x250, 0x250, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@remote, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_0\x00', 'teql0\x00'}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@remote, @rand_addr, 0x0, 0x0, @mac=@broadcast, {}, @mac=@dev, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'veth0_to_team\x00'}, 0xf0, 0x118}, @unspec=@STANDARD={0x28}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 08:06:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 08:06:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 08:06:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 08:06:31 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 08:06:31 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 08:06:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:31 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 08:06:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4500, 0x0) 08:06:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:31 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:31 executing program 0: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 08:06:31 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:32 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:32 executing program 3: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:32 executing program 4: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:32 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:32 executing program 2: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:32 executing program 0: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 3: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 4: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 2: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 0: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 1: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 3: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 4: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 0: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 2: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 1: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 1: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 5: r0 = perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3215}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000000c0)=""/26) fallocate(r1, 0x1, 0x0, 0x10000101) gettid() perf_event_open(&(0x7f0000000940)={0x1, 0x70, 0x800, 0x0, 0x3, 0x4, 0x0, 0x1, 0x2, 0xc, 0x7f, 0x3, 0x4, 0x2, 0x0, 0x1, 0x9, 0x6, 0x6, 0x8, 0x579, 0x1ff, 0x5, 0x2, 0x8dd, 0xfffffffeffffffff, 0x5a2d66b, 0x6, 0x8, 0xfff, 0x8, 0x9, 0x1000, 0x80, 0x9, 0xfffffffffffff9e3, 0x1, 0x165, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000900), 0x2}, 0x8040, 0x7, 0xf1, 0x0, 0x7c6, 0x100000000, 0x7fff}, 0x0, 0x0, r1, 0x3) r2 = getpgrp(0x0) write$selinux_create(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:setrans_var_run_t:c0 system_u:system_r:kernel_t:s0 00000000000000000009 ./bus\x00'], 0x60) arch_prctl(0x1001, &(0x7f0000000100)="9dff43a4a81f66575bb7a6c96154eee9d86f8928b1e6d045823c100ee62cdeb0a8c18c731c9db42f9d1be26fb81d7044dd7ef342a0d5644cebfda959e18d7876c15e2fabedd49ff650fe3d432479a2f78032bda0be86ff1236e58ff3dc449362e09d2e8c973069d93c2028b8a828") syz_open_procfs(r2, &(0x7f0000000840)='net/ip_vs_stats\x00') socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) fcntl$getflags(r0, 0x7) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1008}, 0xc, &(0x7f0000000700)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000228bd7001000000000000000008000600ff7f000008000500090000003c000200080005000700"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') 08:06:34 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:34 executing program 5: r0 = socket$packet(0x11, 0x4000000003, 0x300) sendto$inet6(r0, &(0x7f0000000880)="02030000070000005b000000fff55b42e1938207d9fb3780398d5375000060207929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2d1594c3b50035110f118d0000f55dc62600009b000000faffffff00010000aeb46245004bfedd042b5408a2ba049ef912b413467eb04035cc640ea45cfd4a", 0x7a, 0x0, &(0x7f0000000140)={0xa, 0x200800800, 0x1, @ipv4={[], [], @rand_addr=0x600000000000000}}, 0x1c) 08:06:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 5: r0 = socket$packet(0x11, 0x4000000003, 0x300) sendto$inet6(r0, &(0x7f0000000880)="02030000070000005b000000fff55b42e1938207d9fb3780398d5375000060207929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2d1594c3b50035110f118d0000f55dc62600009b000000faffffff00010000aeb46245004bfedd042b5408a2ba049ef912b413467eb04035cc640ea45cfd4a", 0x7a, 0x0, &(0x7f0000000140)={0xa, 0x200800800, 0x1, @ipv4={[], [], @rand_addr=0x600000000000000}}, 0x1c) 08:06:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:34 executing program 5: r0 = socket$packet(0x11, 0x4000000003, 0x300) sendto$inet6(r0, &(0x7f0000000880)="02030000070000005b000000fff55b42e1938207d9fb3780398d5375000060207929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2d1594c3b50035110f118d0000f55dc62600009b000000faffffff00010000aeb46245004bfedd042b5408a2ba049ef912b413467eb04035cc640ea45cfd4a", 0x7a, 0x0, &(0x7f0000000140)={0xa, 0x200800800, 0x1, @ipv4={[], [], @rand_addr=0x600000000000000}}, 0x1c) 08:06:34 executing program 5: r0 = socket$packet(0x11, 0x4000000003, 0x300) sendto$inet6(r0, &(0x7f0000000880)="02030000070000005b000000fff55b42e1938207d9fb3780398d5375000060207929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2d1594c3b50035110f118d0000f55dc62600009b000000faffffff00010000aeb46245004bfedd042b5408a2ba049ef912b413467eb04035cc640ea45cfd4a", 0x7a, 0x0, &(0x7f0000000140)={0xa, 0x200800800, 0x1, @ipv4={[], [], @rand_addr=0x600000000000000}}, 0x1c) 08:06:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) stat(&(0x7f0000000440)='./bus\x00', &(0x7f0000000480)) getegid() getgroups(0x1, &(0x7f0000000500)=[0xee01]) fstat(r1, &(0x7f0000000540)) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1, 0x1) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(r2, &(0x7f0000000200)=""/19, 0x93fa513f) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 08:06:35 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 08:06:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000440), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) dup2(r0, r2) 08:06:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 08:06:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 08:06:35 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x6558, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) 08:06:35 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000080)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x3) shutdown(r0, 0x0) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@delalloc='delalloc'}], [{@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}) 08:06:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) [ 348.486328] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) 08:06:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) dup2(r1, r0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000180)}, 0x10) 08:06:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) [ 348.599638] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@delalloc='delalloc'}], [{@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}) 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) 08:06:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) 08:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) 08:06:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 348.754953] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@delalloc='delalloc'}], [{@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005800)=[{{&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/164, 0xa4}, {&(0x7f0000001d00)=""/143, 0xa}, {&(0x7f0000000040)=""/162, 0xa2}, {&(0x7f0000001e80)=""/139, 0x8b}], 0x7, &(0x7f0000000140)=""/71, 0x47}}], 0x1, 0x0, 0x0) 08:06:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 348.950478] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x1014001, &(0x7f00000001c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@delalloc='delalloc'}], [{@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner'}}, {@subj_type={'subj_type', 0x3d, 'ext4\x00'}}]}) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) [ 349.102562] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 08:06:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 2: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 08:06:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 2: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x211}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 08:06:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 08:06:36 executing program 0: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 2: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x20, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:36 executing program 0: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10dd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa5, 0x0, 0x2, 0xe8030000}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:36 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:36 executing program 2: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) 08:06:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x20, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:36 executing program 0: r0 = syz_open_procfs(0x0, 0xfffffffffffffffe) getdents(r0, &(0x7f00000000c0)=""/47, 0x2f) 08:06:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10dd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa5, 0x0, 0x2, 0xe8030000}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:37 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x20, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10dd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa5, 0x0, 0x2, 0xe8030000}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x20, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:37 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:37 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:39 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10dd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa5, 0x0, 0x2, 0xe8030000}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 08:06:39 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:39 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:39 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:40 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:40 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:40 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:42 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:42 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:42 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:43 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:43 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:45 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:45 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="734e63757203be7900ae6bb313ac79fb2b000000000000000000000000000000000000000000000000000000000000000000000000040073cf84766a25926aef5ce687e6ffffffffffffff020000000000000000476e73c57c67cd57007d9501ca578ec17cfc4ea610c8e2f225fc104627a4f3d44410a50a28b94dae4313127b85d1dacbee5385501e972992ba4fae994219dbc6985233f1178f9aeed22bf4a0837bae7b9242e4d5f6310ad2f4622887b2c6f8a8832b7af5bb206149334cecf2e781609f4b4830c785cfc58507de34bbd5a770620a15cabe7055229874aad4ba504117b9ff78a02406b1d0c8c92f4efd79e42b3b375168f5e0db24c0060000000000000062a8dc59a44116453494e5f196be6fc76c28d266be92f4d0e771075033aeb4fd50ddee27182f1566c093b0668be2201eadbc172e97ef901a39ac3b7069ed94"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:45 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:49 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:50 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:50 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:50 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x7, 0x0) socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r1, 0x0) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259269557d96d8302c58d34acf675108ed37da02dd147348ffc6678c528ba1d6066873c716c37492267bf3d0270436df7dac601cbc0c41e6fdcb3c6967d", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f26914852b346a51745ff0987773da4a6d28a14b3fb178acea227395a56eafc65f2f1b1affc87c588c3b90c814db3cdec6fd9c21aba78504f4a9023212bba0cddb8578d69bb34") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d2a575966e9dfcd20796e2fba", 0x64}], 0x1, 0x3) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 08:06:50 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:50 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:50 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:51 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:52 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:52 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:52 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:52 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:52 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:52 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:53 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="734e63757203be7900ae6bb313ac79fb2b000000000000000000000000000000000000000000000000000000000000000000000000040073cf84766a25926aef5ce687e6ffffffffffffff020000000000000000476e73c57c67cd57007d9501ca578ec17cfc4ea610c8e2f225fc104627a4f3d44410a50a28b94dae4313127b85d1dacbee5385501e972992ba4fae994219dbc6985233f1178f9aeed22bf4a0837bae7b9242e4d5f6310ad2f4622887b2c6f8a8832b7af5bb206149334cecf2e781609f4b4830c785cfc58507de34bbd5a770620a15cabe7055229874aad4ba504117b9ff78a02406b1d0c8c92f4efd79e42b3b375168f5e0db24c0060000000000000062a8dc59a44116453494e5f196be6fc76c28d266be92f4d0e771075033aeb4fd50ddee27182f1566c093b0668be2201eadbc172e97ef901a39ac3b7069ed94"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:53 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:53 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:53 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:53 executing program 2: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 08:06:54 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="734e63757203be7900ae6bb313ac79fb2b000000000000000000000000000000000000000000000000000000000000000000000000040073cf84766a25926aef5ce687e6ffffffffffffff020000000000000000476e73c57c67cd57007d9501ca578ec17cfc4ea610c8e2f225fc104627a4f3d44410a50a28b94dae4313127b85d1dacbee5385501e972992ba4fae994219dbc6985233f1178f9aeed22bf4a0837bae7b9242e4d5f6310ad2f4622887b2c6f8a8832b7af5bb206149334cecf2e781609f4b4830c785cfc58507de34bbd5a770620a15cabe7055229874aad4ba504117b9ff78a02406b1d0c8c92f4efd79e42b3b375168f5e0db24c0060000000000000062a8dc59a44116453494e5f196be6fc76c28d266be92f4d0e771075033aeb4fd50ddee27182f1566c093b0668be2201eadbc172e97ef901a39ac3b7069ed94"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:56 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)) tkill(r0, 0xa) 08:06:56 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:56 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:56 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:56 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:56 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:59 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x1be) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x4000) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000002c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x10062, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 08:06:59 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:06:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100), 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x25, &(0x7f00000001c0)={@loopback, @multicast2}, 0xc) 08:06:59 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:06:59 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x8b) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 08:06:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 08:06:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 372.299644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 08:06:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:06:59 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:06:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:06:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 372.425547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 08:06:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:07:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 08:07:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:00 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:00 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) [ 373.028954] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 08:07:00 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 08:07:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) [ 373.159772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 08:07:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 08:07:00 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c653020292c65746831286e6f64657674727573746564206d696d655f747970655d73797374656d2070726f63766d508694ba776c616e313a0aeb6ccf970ddbd5103f4d9e7cf6994e40f52a20ed24df68fb0292e8695989ac2f582512d10cae00c57dbcbeb7df0bfd58b84ab7484efb7fd6ebc7034a9c0607c95d86d8e7e872c2de88b159fcfb47f26962a17c9ae201de5d2aab3562c534fcb404c81b26127ecb2bfacdcee60ef130d2c84d0264d78b2308ec17f2121efe518f94acd352695833223d92570092e560490f4dc8a45c2dd90c8deae424efabb3bfc9633e2ed7a964cebae70e5daa0c460f12a5aaa6e227481c000000000000000000000000"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="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", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000000c0)=0xffffffffffffffad, 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/80, 0x50}, 0x0) 08:07:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:02 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:02 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:02 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c653020292c65746831286e6f64657674727573746564206d696d655f747970655d73797374656d2070726f63766d508694ba776c616e313a0aeb6ccf970ddbd5103f4d9e7cf6994e40f52a20ed24df68fb0292e8695989ac2f582512d10cae00c57dbcbeb7df0bfd58b84ab7484efb7fd6ebc7034a9c0607c95d86d8e7e872c2de88b159fcfb47f26962a17c9ae201de5d2aab3562c534fcb404c81b26127ecb2bfacdcee60ef130d2c84d0264d78b2308ec17f2121efe518f94acd352695833223d92570092e560490f4dc8a45c2dd90c8deae424efabb3bfc9633e2ed7a964cebae70e5daa0c460f12a5aaa6e227481c000000000000000000000000"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:02 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:02 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:03 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c653020292c65746831286e6f64657674727573746564206d696d655f747970655d73797374656d2070726f63766d508694ba776c616e313a0aeb6ccf970ddbd5103f4d9e7cf6994e40f52a20ed24df68fb0292e8695989ac2f582512d10cae00c57dbcbeb7df0bfd58b84ab7484efb7fd6ebc7034a9c0607c95d86d8e7e872c2de88b159fcfb47f26962a17c9ae201de5d2aab3562c534fcb404c81b26127ecb2bfacdcee60ef130d2c84d0264d78b2308ec17f2121efe518f94acd352695833223d92570092e560490f4dc8a45c2dd90c8deae424efabb3bfc9633e2ed7a964cebae70e5daa0c460f12a5aaa6e227481c000000000000000000000000"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:03 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:03 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) write$P9_ROPEN(r1, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x4, 0x7}, 0x100000000}}, 0x18) clone(0xe2020500, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) clone(0x12000, &(0x7f0000000540)="88c7ca1cbb367ad617c34f231e78d19783d563b26d19291d7c774c87f3267772aa3d20bc10cb79362fbb9c22a157ca23b8a9117c18ea7d443ec56cce72c5fbc41d5bbd75d7c295a8d0a960b4957cb328efec653139689ac1b84bfe131e5d0372bba31085e06d308bdb0072a9cef3e8d0449119f40ebc916e3d9a4cb31772a07a247f839fe925d8ab6730a381b977b4a53bb0cdf106fd8004a05bef826cf83f0a8d3d27c58e1d5737a3621da506c725fce543", &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000600)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x105) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)=0x7fff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r3, 0xf, 0x2}, 0x10) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000300)={0x6, 0xe87}) io_setup(0x3ff, &(0x7f00000000c0)) 08:07:03 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f0000000340)='./file0/file0\x00', 0x0) 08:07:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d8", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=""/207, 0xcf) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x204040, 0x0) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000cd5000/0x4000)=nil) getpgid(0x0) munlockall() 08:07:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000240), 0x1c) 08:07:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) fcntl$getown(r0, 0x9) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000240)={0x240000000}) exit(0x0) 08:07:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) fcntl$getown(r0, 0x9) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000240)={0x240000000}) exit(0x0) 08:07:13 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:13 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) fcntl$getown(r0, 0x9) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000240)={0x240000000}) exit(0x0) [ 386.051273] binder: 23669:23670 transaction failed 29189/-22, size 0-8 line 3012 [ 386.080366] binder: 23669:23673 transaction failed 29189/-22, size 0-8 line 3012 08:07:13 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f00000000c0), 0xc, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="100027d6e4f4d0f0e7d40002b153"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001840)=[{&(0x7f0000002140)="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", 0x100}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 08:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) 08:07:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:13 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) fcntl$getown(r0, 0x9) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000240)={0x240000000}) exit(0x0) [ 386.096752] binder: undelivered TRANSACTION_ERROR: 29189 [ 386.128324] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f00000000c0), 0xc, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="100027d6e4f4d0f0e7d40002b153"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001840)=[{&(0x7f0000002140)="cef02354f82031f9539b8392175f70ff3e2b16e332801ae240489f90a54427f7fd0a012219bb7225a3854c402d686b28cb5a1a83b627bdd26f8a7ff3b153391a20f11acd4970f21e93e909cf3c1a46b3dd2c3c9a54070000002b763d5a65093c0eaa0e87443b3e6c497564030d877d800e2472caa74eac4b910d5a6112a87db90eb417910a43e915b91750bba24543f6de1d58de45399945a582399bc283451df277a4fd2db569eb1fca342a41f8a1cb4cb7a844332e2259f341f1abff7fd1dc07449a13b2e019dd9a6ba4f6948202977b06417da05299a31ed5f233d44c96c17895a9bbbf517de9818f14ecd3af7e383eada0af0ccb4f2473c4d4222c36085c", 0x100}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 08:07:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:14 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f00000000c0), 0xc, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="100027d6e4f4d0f0e7d40002b153"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001840)=[{&(0x7f0000002140)="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", 0x100}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 08:07:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 386.594809] binder: 23693:23698 transaction failed 29189/-22, size 0-8 line 3012 [ 386.609770] binder: 23696:23700 transaction failed 29189/-22, size 0-8 line 3012 [ 386.611539] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:14 executing program 4: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x80000001}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f00000000c0), 0xc, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="100027d6e4f4d0f0e7d40002b153"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001840)=[{&(0x7f0000002140)="cef02354f82031f9539b8392175f70ff3e2b16e332801ae240489f90a54427f7fd0a012219bb7225a3854c402d686b28cb5a1a83b627bdd26f8a7ff3b153391a20f11acd4970f21e93e909cf3c1a46b3dd2c3c9a54070000002b763d5a65093c0eaa0e87443b3e6c497564030d877d800e2472caa74eac4b910d5a6112a87db90eb417910a43e915b91750bba24543f6de1d58de45399945a582399bc283451df277a4fd2db569eb1fca342a41f8a1cb4cb7a844332e2259f341f1abff7fd1dc07449a13b2e019dd9a6ba4f6948202977b06417da05299a31ed5f233d44c96c17895a9bbbf517de9818f14ecd3af7e383eada0af0ccb4f2473c4d4222c36085c", 0x100}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 386.686587] binder: 23706:23709 transaction failed 29189/-22, size 0-8 line 3012 [ 386.689695] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:14 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x17}}) 08:07:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) [ 386.792659] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x17}}) [ 386.846262] binder: 23720:23727 transaction failed 29189/-22, size 0-8 line 3012 08:07:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 08:07:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000000) 08:07:14 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) [ 386.900202] binder: undelivered TRANSACTION_ERROR: 29189 [ 386.908622] binder: 23723:23730 transaction failed 29189/-22, size 0-8 line 3012 08:07:14 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x17}}) [ 386.968112] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x17}}) 08:07:14 executing program 2: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) [ 387.011362] binder: 23736:23743 transaction failed 29189/-22, size 0-8 line 3012 08:07:14 executing program 1: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 0: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 5: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) [ 387.083205] binder: undelivered TRANSACTION_ERROR: 29189 08:07:14 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 2: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 1: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 0: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 5: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:14 executing program 1: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 2: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 0: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 5: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) 08:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'syz_tun\x00', @ifru_flags=0x100}) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) 08:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'syz_tun\x00', @ifru_flags=0x100}) 08:07:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) 08:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'syz_tun\x00', @ifru_flags=0x100}) 08:07:15 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) 08:07:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'syz_tun\x00', @ifru_flags=0x100}) 08:07:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:15 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:15 executing program 3: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x13, 0x0, "12b4af50352e4f3e06515781bc0b000868d3d74afdde2d06c98c2ce18af9c9e56f83801c07747ce525402dba0a182a4df685340072f28362bbca57b72302704d", "00979f53cfccdc311f853b09adce086f76067d351bd14a72676965df2c3cf60c", [0x7fff, 0x5]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000040)=""/42) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[{0x8, 0xb505}], 0x1) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x80000000, 0x81, 0x1, 0x7ff000000, 0x401, 0x400}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) getrlimit(0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bond0\x00', 0x8}) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000003c0)={0x20, 0x4, 0x6}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x3ff, 0x4}) prctl$setfpexc(0xc, 0x20001) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x8, "95cf10531413b9e7bed61917672d9fbfef9e00fd2626fa95e71f07b41d9df1d46fc22af476b5b5e98c48e0394bb06e4258728d9512a8eadedff57709e677fab0", "156abb234af06145f4cc602b54d2df209bdbe3bbe604458481b77ed2c8c90868", [0x7, 0xfff]}) r6 = fcntl$getown(r5, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000400)=r6) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x200300}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff}, 0x14) 08:07:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff}, 0x20) 08:07:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) [ 388.399065] audit: type=1400 audit(1540454835.821:27): avc: denied { map } for pid=23892 comm="syz-executor0" path="/root/syzkaller-testdir768339464/syzkaller.Giq1BP/689/bus" dev="sda1" ino=16572 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_unit_file_t:s0 tclass=file permissive=1 08:07:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:16 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) flock(r0, 0x5) preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0) 08:07:16 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:16 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 2: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:16 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 390.076547] syz-executor5 (23972) used greatest stack depth: 23072 bytes left 08:07:17 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 2: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:17 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:18 executing program 2: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 1: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="461b02b000680004030c907800000007000000024408fd6300000004cf10bd9d6b28c857b80b7445c647a647072b04e0000002ac1414aae0000001ac14140aac14140fffffffffe0000002ffffffff7f00000100000000010c20880b00cc00012e1a9271a06232e5442796738e768c750fa95e5e650d76b29ab0fc369231ba7043078bb47cfe54c18c99281d09b2c7b6a1fa16a0a95404e8bfa974fa01cf44ac744fda917a51fa490c3b03f69e706e96f2feeb9643206639877f45ea51c06f5744740bbd1ce508a88ea391cecb8c280c6c487b94d36453f7f7921c2d53a0cd3e500fe329918fcbd0a7645e9173317a0a59c1d58d87715baa948ad36c14d32cf0207ff7e8125b7f5798cde436c8b6001597836e893ec466a48d4a07f572150400080000068e7c0003ee36630a1265bd14859696848debd00d0086dd0008fffedb5648350b30bcdcde107a20be1f065e629167b2532663b90c5fce91f07e00c1fd37ece2c82de54d81fc1fa28d32a0c0223ed62d5e1ed02aed381a08b9c6d1176dfcf92c6e3dc288a8c3015f79e03028e47006121ad13f97e2b6063d6d1b5f409aabe2e67881a4b162acdf6c49013904000000000000003dccbe5235f0cd8f290efa33a48a62a48abcf7add7289b78418eda8813dd080088be000000011f1940c201000000fffffffd080022eb00000004220910f8020000000000000600010e11329836426d8967877de587c7ba819cc94a2b2bf65a0ad89bc2128c3ab768fc9e33c1a64bb230eaab5c2e08f4ecefe3dde6e7162f1e1b6278b9deb0a13570fbaa82f079352e1d83728805e1860fedbec5ce56de8f1563b9c25a833fae37339419d33a44b9efe412190a1eb5337a800e3da7a167a11221eda9e15f6292b03b421dc9039fa517a8a9ff61f3f9fefb381a858c63735aa399aed032a6f0a4cc1b4acbc73fbbd336b4d0c5e88cfe"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:19 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 5: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r3, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000080), 0x10}]) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000280)='\'', 0x1}], 0x1) io_getevents(r3, 0x5, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r4, r2, 0x8, 0x0) 08:07:20 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:20 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:20 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000000000207000000400000000000009900000000"], 0x2c) [ 392.995201] SELinux: failed to load policy 08:07:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000000000207000000400000000000009900000000"], 0x2c) [ 393.071240] SELinux: failed to load policy 08:07:20 executing program 3: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000000000207000000400000000000009900000000"], 0x2c) 08:07:20 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) [ 393.191019] SELinux: failed to load policy 08:07:20 executing program 4: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:20 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000000000207000000400000000000009900000000"], 0x2c) 08:07:20 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) [ 393.377292] SELinux: failed to load policy 08:07:20 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:20 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:21 executing program 0: lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="85fe3e1d5fc932bdeb3cff446a3d90cbb890191d5c39d9feb2c50bba9156ef3760e36bcdc89a27996526064b5759884d18f18bcd172d1568532f44ec2a864609f334603af3ab11ba6245b04aea44f0835a88bced44394e98f230a4cdfe3146a0ac094baa3fa132faf6380ff673071bd2d315197d57a760fbee8461de9c3b28879347aa35cbc6efa143"], &(0x7f0000000280)='\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) write$tun(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) setxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) r3 = open(&(0x7f00000002c0)='./bus\x00', 0x40000, 0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 08:07:21 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:21 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:21 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:21 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:21 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:22 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:22 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr\x00') r0 = getpid() tkill(r0, 0x9) waitid(0x0, 0x0, &(0x7f0000000100), 0xc0000006, &(0x7f0000000140)) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:22 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46730002000000000000000000020003004d0a00006e010000000000004000000000000000f401000000000000ffff0000030038000100ffff0000d9ba050000700100000040000000000000000500000000000000018000000000000001000000000000000600000000000000010000800000000005402fc8e76d86f7afad21f1dfde89256d81fe0fe797a94935e51d088d8f8a6dd8cbf0d6b2054dff5129e827281a313a688007a3ea53e2c8b190c043c04c206c9657712327654e700dac1c8bc9905e26f8000000000000001d000000000000000000004d86a89ba98dde00000000000000000000000000000000000000000000000000000000000000000000000000000000700c000000000000000000000000000000000000000000"], 0x121) sendfile(r0, r0, &(0x7f0000000080), 0x10001) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 08:07:22 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/136) 08:07:23 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}}, {{&(0x7f00000035c0)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000013c0)}}], 0x2, 0x0) 08:07:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) 08:07:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) 08:07:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:23 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) 08:07:23 executing program 5: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:23 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) 08:07:23 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) [ 396.189573] audit: type=1400 audit(1540454843.601:28): avc: denied { sys_admin } for pid=24351 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 08:07:23 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 5: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:23 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:23 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:24 executing program 5: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:24 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:24 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:24 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:24 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x13d}], 0xffffffffffffeee, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000268, 0x0) 08:07:24 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:25 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:26 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:27 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="45e4d7cb3d36c8bc5b2c554366262f0aaa49c02a6465f844a3d57109f877bcc49ac854fae35d5ba966a61961721d4921dcf508fc530e732e85ded6deb33ad40efa6cd888a846e3ec221cb0b9d81648a2fc06d896e2ae0f1570c3bb522b8b7bf37f4b1022465bb554f4443858d66091ef6b806ff54befb198abf080220891b94f884495dfcf2813bb3ab83b89941b94f4c9cd71929174ccd2b1722620d18594e2ee870442100bddea82d109902bcf20e35aa7c3640003c9ee70862db98242e95dbfc8004d974a185027ebd0295396687f6a22566ab8c08e305410d69c3664a63f2a7f82ac3da7b925d3cb3c4e1304f3b7cdbed719dc73d5b3549c", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:28 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:29 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:29 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:29 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:29 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:29 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:30 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000004, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)=""/175, 0xaf) 08:07:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000004, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)=""/175, 0xaf) 08:07:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000004, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)=""/175, 0xaf) [ 402.991527] audit: type=1400 audit(1540454850.421:29): avc: denied { map } for pid=24601 comm="syz-executor5" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=66171 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 08:07:30 executing program 1: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000008c0)='id_legacy\x00', &(0x7f0000000900), &(0x7f0000000940)=':wlan1:&%\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000800), 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001800), &(0x7f0000001840)=0x4) signalfd(0xffffffffffffffff, &(0x7f0000000ec0), 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[], 0x0) dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a80)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000c00)=""/253}, 0x18) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000015c0)={'filter\x00'}, &(0x7f0000001640)=0x44) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) delete_module(&(0x7f0000001740)='/dev/ppp\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) get_thread_area(&(0x7f0000000300)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000ac0)="1cd2805da06922692295d3200f01eece41ff0f1837c442a1a608c4c19086d9f28fc9410feefa6b217973e5e5412e0f5b190f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d00)) lsetxattr$trusted_overlay_origin(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='trusted.overlay.origin\x00', &(0x7f0000001700)='y\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40)}, &(0x7f0000000e40)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a40), 0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) open(&(0x7f0000000e80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'lo\x00'}) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0xe8) 08:07:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000040)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r1, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000004, 0x11, r1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)=""/175, 0xaf) 08:07:30 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=ANY=[], 0x0, 0x2) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='S'], 0x1) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000240)='\'\\nodev\x00', &(0x7f0000000280)='/security\x00']) sendfile(r1, r1, &(0x7f0000000780), 0x400) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) timerfd_settime(r1, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr$security_evm(r1, &(0x7f0000000740)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="05010c0000000081007f41c695416c564c1e0e7b7a3dd5e587dacbc2fb6d44a475e624172429b4996592020ad4c3ae095fe7ea6ff5"], 0x1, 0x0) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(0xffffffffffffffff, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/243, 0xf3}, {&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}], 0x3) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(r1, &(0x7f0000000380)=""/249, 0xf9) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x130) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000840)={'veth1\x00', {0x2, 0x4e21, @multicast2}}) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x442) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000f80)='/selinux/checkreqprot\x00', 0x0, 0x0) recvfrom(r1, &(0x7f00000008c0)=""/57, 0x39, 0x20, &(0x7f00000009c0)=@llc={0x1a, 0x33f, 0xe, 0x0, 0x6, 0x1, @random="407834ce5f34"}, 0x80) 08:07:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x12, r0}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="075cbe240400"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000001) 08:07:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept(r1, &(0x7f0000000040)=@hci, &(0x7f0000c3d000)=0x80) 08:07:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 08:07:30 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 08:07:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x12, r0}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="075cbe240400"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000001) 08:07:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept(r1, &(0x7f0000000040)=@hci, &(0x7f0000c3d000)=0x80) 08:07:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 08:07:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x12, r0}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="075cbe240400"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000001) 08:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=ANY=[], 0x0, 0x2) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='S'], 0x1) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000240)='\'\\nodev\x00', &(0x7f0000000280)='/security\x00']) sendfile(r1, r1, &(0x7f0000000780), 0x400) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) timerfd_settime(r1, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr$security_evm(r1, &(0x7f0000000740)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="05010c0000000081007f41c695416c564c1e0e7b7a3dd5e587dacbc2fb6d44a475e624172429b4996592020ad4c3ae095fe7ea6ff5"], 0x1, 0x0) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(0xffffffffffffffff, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/243, 0xf3}, {&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}], 0x3) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(r1, &(0x7f0000000380)=""/249, 0xf9) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x130) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000840)={'veth1\x00', {0x2, 0x4e21, @multicast2}}) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x442) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000f80)='/selinux/checkreqprot\x00', 0x0, 0x0) recvfrom(r1, &(0x7f00000008c0)=""/57, 0x39, 0x20, &(0x7f00000009c0)=@llc={0x1a, 0x33f, 0xe, 0x0, 0x6, 0x1, @random="407834ce5f34"}, 0x80) 08:07:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept(r1, &(0x7f0000000040)=@hci, &(0x7f0000c3d000)=0x80) 08:07:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 08:07:31 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="bbd44ef78e44b0431d01beb56ff7063ae8a7ef04d2858f0625688087f4b8ad687c510bc10abab4af5c519d4a2c8fc9e1862018d8f63e089adc85025487bdee0e9ea3e1bacd9757c3c305e2a7521ee9ebfa5512a2d9006d3661ac5c73cce8a306f429dd1eb3a046ada41d4366a0fcbbd96ef1d64ba80358e0fd5de0e1261cc4a7855ad2cbea7a262366582d54fb1244878eba5672cbcb752d9ee193e4c0de2ee4ea3decd61464d9346a4e4bcfd5972fd9ce736ff6fa149576bd6c96cdd979102edb0eb886afa2a0aeed942a7abac6995ae60c9b1858b4ce0c610a6c8be5ff3c7557ef291578cca31a9bd2a021c0e55001fb8b0031bf177ec29361a4aa794fbc9c") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x12, r0}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="075cbe240400"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000001) 08:07:31 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) keyctl$join(0x1, &(0x7f0000000300)={'syz', 0x3}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x37, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000006c0)="5b2bcd1a0fdc85f7845f7f94caac2ec58a7f71d7d3e5c6993d869c18b236dbf1a6e101595a920677f95931909b609702c5030575e48318219f9f161ed1fbf7ac41edd55c95a1219c7d530f656eb9235c74e31f07fdffae1c4431a9c47e14254df20fdcb452ecc468f9eac4"}}, &(0x7f0000000740)=0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000a40)={0xe4, 0x29, 0x2, {0xffffffff, [{{0x80, 0x1}, 0xb2c1, 0xfffffffffffff000, 0x7, './file0'}, {{0x1, 0x1, 0x8}, 0xac, 0x8, 0x7, './file1'}, {{0xa0, 0x1}, 0x3, 0x9, 0x7, './file0'}, {{0x80, 0x4, 0x5}, 0x5, 0x7fffffff, 0x7, './file0'}, {{0x71, 0x0, 0x2}, 0x10001, 0x2, 0x7, './file0'}, {{0x0, 0x3, 0x6}, 0x5, 0x1, 0x7, './file0'}, {{0x4, 0x1, 0x5}, 0xa11, 0xfd3, 0x7, './file0'}]}}, 0xe4) timer_delete(r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getrlimit(0x6, &(0x7f0000000900)) vmsplice(0xffffffffffffffff, &(0x7f0000000540), 0xb9, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000080)={0xfffffffffffffffd}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)={0x0, 0x0}}, 0x10) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000b80)=0x1) write$P9_RLOPEN(r3, &(0x7f0000000880)={0x18, 0xd, 0x3, {{0x80, 0x4, 0x7}, 0xffffffffffff0e4b}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x51}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpgrp(0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/uhid\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580)=0x6, 0x4) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) syz_open_procfs$namespace(r6, &(0x7f00000007c0)='ns/net\x00') io_setup(0x0, &(0x7f0000000180)) clone(0x1000000070024104, &(0x7f0000000780)="60eb8e60ad79eb0277580b71695ae542ad1ed11cacaf10317f60c0e7cd79c98122e72f2c952fbb46f062b940290a66e1d2b97ab3f4f5393e", &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000940)="f3fb973e6d716e1b34197b16e9d562162a51367ea8004acee335b7bf3a754dfc6bb63c5464e244378658817152ac9638eb8fee31164475ffbfdd2e4cb7cc02da967a000a3a669df8ab6bad81c21b021a72d50604ee162519db40ec752e4d7fa3a8cbe1d5ec70e5d6b92b68e4ea90483ca24ed8ad931b9f6241f843e00923d25fe466eba9147992bdfb9bc2c068ab0553238d2e491edceb9f5833f0f018cf745ad5837ca36f39507c35782559a1235d7c43272d9de5654e4030ed2b90bf78") perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000008c0)={0x4, &(0x7f0000000100)=[{0xc76, 0xff, 0x1, 0x7f}, {0x8, 0xffffffff, 0x100000001, 0x3}, {0xffff, 0x46, 0x5, 0x3ff}, {0xfffffffffffffff7, 0x4, 0x5, 0x2}]}) 08:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=ANY=[], 0x0, 0x2) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='S'], 0x1) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000240)='\'\\nodev\x00', &(0x7f0000000280)='/security\x00']) sendfile(r1, r1, &(0x7f0000000780), 0x400) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) timerfd_settime(r1, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr$security_evm(r1, &(0x7f0000000740)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="05010c0000000081007f41c695416c564c1e0e7b7a3dd5e587dacbc2fb6d44a475e624172429b4996592020ad4c3ae095fe7ea6ff5"], 0x1, 0x0) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(0xffffffffffffffff, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/243, 0xf3}, {&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}], 0x3) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(r1, &(0x7f0000000380)=""/249, 0xf9) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x130) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000840)={'veth1\x00', {0x2, 0x4e21, @multicast2}}) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x442) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000f80)='/selinux/checkreqprot\x00', 0x0, 0x0) recvfrom(r1, &(0x7f00000008c0)=""/57, 0x39, 0x20, &(0x7f00000009c0)=@llc={0x1a, 0x33f, 0xe, 0x0, 0x6, 0x1, @random="407834ce5f34"}, 0x80) 08:07:31 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="bbd44ef78e44b0431d01beb56ff7063ae8a7ef04d2858f0625688087f4b8ad687c510bc10abab4af5c519d4a2c8fc9e1862018d8f63e089adc85025487bdee0e9ea3e1bacd9757c3c305e2a7521ee9ebfa5512a2d9006d3661ac5c73cce8a306f429dd1eb3a046ada41d4366a0fcbbd96ef1d64ba80358e0fd5de0e1261cc4a7855ad2cbea7a262366582d54fb1244878eba5672cbcb752d9ee193e4c0de2ee4ea3decd61464d9346a4e4bcfd5972fd9ce736ff6fa149576bd6c96cdd979102edb0eb886afa2a0aeed942a7abac6995ae60c9b1858b4ce0c610a6c8be5ff3c7557ef291578cca31a9bd2a021c0e55001fb8b0031bf177ec29361a4aa794fbc9c") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept(r1, &(0x7f0000000040)=@hci, &(0x7f0000c3d000)=0x80) 08:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=ANY=[], 0x0, 0x2) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB='S'], 0x1) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)="74086e750000000000000000008c00"], &(0x7f0000000300)=[&(0x7f0000000240)='\'\\nodev\x00', &(0x7f0000000280)='/security\x00']) sendfile(r1, r1, &(0x7f0000000780), 0x400) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) timerfd_settime(r1, 0x1, &(0x7f00000007c0)={{}, {0x77359400}}, &(0x7f0000000800)) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr$security_evm(r1, &(0x7f0000000740)='security.evm\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="05010c0000000081007f41c695416c564c1e0e7b7a3dd5e587dacbc2fb6d44a475e624172429b4996592020ad4c3ae095fe7ea6ff5"], 0x1, 0x0) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) readv(0xffffffffffffffff, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/243, 0xf3}, {&(0x7f0000000b80)=""/146, 0x92}, {&(0x7f0000000c40)=""/216, 0xd8}], 0x3) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) flistxattr(r1, &(0x7f0000000380)=""/249, 0xf9) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x130) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000840)={'veth1\x00', {0x2, 0x4e21, @multicast2}}) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r3, 0x1, 0x0, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x442) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000f80)='/selinux/checkreqprot\x00', 0x0, 0x0) recvfrom(r1, &(0x7f00000008c0)=""/57, 0x39, 0x20, &(0x7f00000009c0)=@llc={0x1a, 0x33f, 0xe, 0x0, 0x6, 0x1, @random="407834ce5f34"}, 0x80) 08:07:31 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:32 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:32 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) 08:07:33 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x22) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = getuid() r5 = getegid() fstat(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}], {0x4, 0x1}, [{0x8, 0x1}, {0x8, 0x4, r5}, {0x8, 0x3, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x44, 0x2) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000140)="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") vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x75444198) [ 406.681756] ================================================================== [ 406.689191] BUG: KASAN: use-after-free in perf_output_read+0xe4d/0xfb0 [ 406.695873] Read of size 8 at addr ffff8801c4e0ad88 by task syz-executor3/24730 [ 406.703305] [ 406.704931] CPU: 0 PID: 24730 Comm: syz-executor3 Not tainted 4.14.78+ #26 [ 406.711939] Call Trace: [ 406.714539] dump_stack+0xb9/0x11b [ 406.718094] print_address_description+0x60/0x22b [ 406.722939] kasan_report.cold.6+0x11b/0x2dd [ 406.727352] ? perf_output_read+0xe4d/0xfb0 [ 406.731679] perf_output_read+0xe4d/0xfb0 [ 406.735837] ? retint_kernel+0x2d/0x2d [ 406.739752] ? perf_event_exit_cpu_context+0x170/0x170 [ 406.745040] ? perf_output_copy+0x150/0x1e0 [ 406.749369] perf_output_sample+0x10dd/0x1780 [ 406.753861] ? smp_call_function_single+0x144/0x320 [ 406.758877] ? flush_tlb_func_common.constprop.4+0x8f0/0x8f0 [ 406.764689] ? __perf_event_header__init_id.isra.35+0x274/0x420 [ 406.770833] ? perf_event__output_id_sample+0x70/0x70 [ 406.776039] ? perf_output_sample+0x1780/0x1780 [ 406.780715] ? lock_acquire+0x10f/0x380 [ 406.784712] ? perf_prepare_sample+0x13c0/0x13c0 [ 406.789477] perf_event_output_forward+0x121/0x230 [ 406.794402] ? perf_prepare_sample+0x13c0/0x13c0 [ 406.799156] ? retint_kernel+0x2d/0x2d [ 406.803045] ? trace_hardirqs_on_caller+0x381/0x520 [ 406.808072] __perf_event_overflow+0x116/0x320 [ 406.812677] perf_swevent_overflow+0x166/0x1f0 [ 406.817261] perf_swevent_event+0x19c/0x270 [ 406.821581] ___perf_sw_event+0x296/0x480 [ 406.825725] ? __lock_acquire+0x619/0x4320 [ 406.829964] ? perf_pending_event+0xe0/0xe0 [ 406.834286] ? do_wp_page+0x254/0x1880 [ 406.838181] ? mark_held_locks+0xc2/0x130 [ 406.842333] ? __handle_mm_fault+0x657/0x23a0 [ 406.846825] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 406.851580] ? vm_insert_page+0x6d0/0x6d0 [ 406.855726] ? retint_kernel+0x2d/0x2d [ 406.859622] ? __do_page_fault+0x485/0xb60 [ 406.863888] ? check_preemption_disabled+0x34/0x160 [ 406.868906] ? __perf_sw_event+0x3f/0x70 [ 406.872973] __perf_sw_event+0x3f/0x70 [ 406.876868] __do_page_fault+0x77f/0xb60 [ 406.880932] ? bad_area_access_error+0x330/0x330 [ 406.885697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 406.890543] page_fault+0x22/0x50 [ 406.893998] RIP: 0010:copy_user_enhanced_fast_string+0x7/0x10 [ 406.899876] RSP: 0018:ffff8801c1ec7b48 EFLAGS: 00010206 [ 406.905238] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000500 [ 406.912505] RDX: 0000000000001000 RSI: ffff8801c653fb00 RDI: 0000000020337000 [ 406.919788] RBP: 0000000020336500 R08: 0000000000000000 R09: 0000000000000040 [ 406.927150] R10: ffffed0038ca7fff R11: ffff8801c653ffff R12: ffff8801c653f000 [ 406.934411] R13: 00007ffffffff000 R14: 0000000020337500 R15: 0000000000001000 [ 406.941706] copyout+0x99/0xc0 [ 406.944914] copy_page_to_iter+0x31d/0xd40 [ 406.949179] pipe_to_user+0xa6/0x160 [ 406.952904] ? anon_pipe_buf_release+0x17f/0x210 [ 406.957700] __splice_from_pipe+0x324/0x740 [ 406.962024] ? iter_to_pipe+0x410/0x410 [ 406.966007] vmsplice_to_user+0x1bd/0x1e0 [ 406.970155] ? __splice_from_pipe+0x740/0x740 [ 406.974653] ? __might_fault+0x104/0x1b0 [ 406.978742] ? __might_fault+0xd4/0x1b0 [ 406.982735] ? lock_downgrade+0x560/0x560 [ 406.986914] ? lock_acquire+0x10f/0x380 [ 406.990910] ? check_preemption_disabled+0x34/0x160 [ 406.995928] ? __fget+0x22b/0x3a0 [ 406.999404] SyS_vmsplice+0x12f/0x150 [ 407.003203] ? default_file_splice_write+0x80/0x80 [ 407.008136] do_syscall_64+0x19b/0x4b0 [ 407.012027] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.017212] RIP: 0033:0x457569 [ 407.020402] RSP: 002b:00007f052fd0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 407.028104] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 407.035370] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 407.042632] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 407.049912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f052fd0b6d4 [ 407.057194] R13: 00000000004c4f4d R14: 00000000004d8520 R15: 00000000ffffffff [ 407.064483] [ 407.066108] Allocated by task 24731: [ 407.069865] kasan_kmalloc.part.1+0x4f/0xd0 [ 407.074177] __kmalloc+0x153/0x340 [ 407.077714] load_elf_phdrs+0x118/0x1b0 [ 407.081684] load_elf_binary+0x2f0/0x4530 [ 407.085843] search_binary_handler+0x13f/0x6c0 [ 407.090448] do_execveat_common.isra.14+0x1109/0x1d60 [ 407.095637] SyS_execve+0x34/0x40 [ 407.099084] do_syscall_64+0x19b/0x4b0 [ 407.102972] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.108149] [ 407.109766] Freed by task 24731: [ 407.113128] kasan_slab_free+0xac/0x190 [ 407.117099] kfree+0xf5/0x310 [ 407.120199] load_elf_binary+0x1c56/0x4530 [ 407.124435] search_binary_handler+0x13f/0x6c0 [ 407.129016] do_execveat_common.isra.14+0x1109/0x1d60 [ 407.134197] SyS_execve+0x34/0x40 [ 407.137648] do_syscall_64+0x19b/0x4b0 [ 407.141546] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.146733] [ 407.148360] The buggy address belongs to the object at ffff8801c4e0ac80 [ 407.148360] which belongs to the cache kmalloc-512 of size 512 [ 407.161016] The buggy address is located 264 bytes inside of [ 407.161016] 512-byte region [ffff8801c4e0ac80, ffff8801c4e0ae80) [ 407.172879] The buggy address belongs to the page: [ 407.177801] page:ffffea0007138280 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 407.187767] flags: 0x4000000000008100(slab|head) [ 407.192518] raw: 4000000000008100 0000000000000000 0000000000000000 00000001000c000c [ 407.200398] raw: 0000000000000000 0000000a00000001 ffff8801d6402c00 0000000000000000 [ 407.208266] page dumped because: kasan: bad access detected [ 407.213967] [ 407.215584] Memory state around the buggy address: [ 407.220505] ffff8801c4e0ac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 407.227859] ffff8801c4e0ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 407.235243] >ffff8801c4e0ad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 407.242594] ^ [ 407.246242] ffff8801c4e0ae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 407.253609] ffff8801c4e0ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 407.260963] ================================================================== [ 407.268313] Disabling lock debugging due to kernel taint [ 407.274026] Kernel panic - not syncing: panic_on_warn set ... [ 407.274026] [ 407.281394] CPU: 0 PID: 24730 Comm: syz-executor3 Tainted: G B 4.14.78+ #26 [ 407.289612] Call Trace: [ 407.292246] dump_stack+0xb9/0x11b [ 407.295788] panic+0x1bf/0x3a4 [ 407.298999] ? add_taint.cold.4+0x16/0x16 [ 407.303155] kasan_end_report+0x43/0x49 [ 407.307129] kasan_report.cold.6+0x77/0x2dd [ 407.311444] ? perf_output_read+0xe4d/0xfb0 [ 407.315782] perf_output_read+0xe4d/0xfb0 [ 407.319928] ? retint_kernel+0x2d/0x2d [ 407.323821] ? perf_event_exit_cpu_context+0x170/0x170 [ 407.329158] ? perf_output_copy+0x150/0x1e0 [ 407.333478] perf_output_sample+0x10dd/0x1780 [ 407.337977] ? smp_call_function_single+0x144/0x320 [ 407.342992] ? flush_tlb_func_common.constprop.4+0x8f0/0x8f0 [ 407.348789] ? __perf_event_header__init_id.isra.35+0x274/0x420 [ 407.354849] ? perf_event__output_id_sample+0x70/0x70 [ 407.360052] ? perf_output_sample+0x1780/0x1780 [ 407.364747] ? lock_acquire+0x10f/0x380 [ 407.368730] ? perf_prepare_sample+0x13c0/0x13c0 [ 407.373489] perf_event_output_forward+0x121/0x230 [ 407.378418] ? perf_prepare_sample+0x13c0/0x13c0 [ 407.383172] ? retint_kernel+0x2d/0x2d [ 407.387058] ? trace_hardirqs_on_caller+0x381/0x520 [ 407.392079] __perf_event_overflow+0x116/0x320 [ 407.396658] perf_swevent_overflow+0x166/0x1f0 [ 407.401261] perf_swevent_event+0x19c/0x270 [ 407.405576] ___perf_sw_event+0x296/0x480 [ 407.409752] ? __lock_acquire+0x619/0x4320 [ 407.413985] ? perf_pending_event+0xe0/0xe0 [ 407.418308] ? do_wp_page+0x254/0x1880 [ 407.422195] ? mark_held_locks+0xc2/0x130 [ 407.426346] ? __handle_mm_fault+0x657/0x23a0 [ 407.430839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.435590] ? vm_insert_page+0x6d0/0x6d0 [ 407.439730] ? retint_kernel+0x2d/0x2d [ 407.443620] ? __do_page_fault+0x485/0xb60 [ 407.447849] ? check_preemption_disabled+0x34/0x160 [ 407.452859] ? __perf_sw_event+0x3f/0x70 [ 407.456916] __perf_sw_event+0x3f/0x70 [ 407.460809] __do_page_fault+0x77f/0xb60 [ 407.464866] ? bad_area_access_error+0x330/0x330 [ 407.469616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.474452] page_fault+0x22/0x50 [ 407.477900] RIP: 0010:copy_user_enhanced_fast_string+0x7/0x10 [ 407.483772] RSP: 0018:ffff8801c1ec7b48 EFLAGS: 00010206 [ 407.489125] RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000500 [ 407.496382] RDX: 0000000000001000 RSI: ffff8801c653fb00 RDI: 0000000020337000 [ 407.503641] RBP: 0000000020336500 R08: 0000000000000000 R09: 0000000000000040 [ 407.510901] R10: ffffed0038ca7fff R11: ffff8801c653ffff R12: ffff8801c653f000 [ 407.518158] R13: 00007ffffffff000 R14: 0000000020337500 R15: 0000000000001000 [ 407.525434] copyout+0x99/0xc0 [ 407.528621] copy_page_to_iter+0x31d/0xd40 [ 407.532854] pipe_to_user+0xa6/0x160 [ 407.536557] ? anon_pipe_buf_release+0x17f/0x210 [ 407.541338] __splice_from_pipe+0x324/0x740 [ 407.545657] ? iter_to_pipe+0x410/0x410 [ 407.549626] vmsplice_to_user+0x1bd/0x1e0 [ 407.553764] ? __splice_from_pipe+0x740/0x740 [ 407.558255] ? __might_fault+0x104/0x1b0 [ 407.562308] ? __might_fault+0xd4/0x1b0 [ 407.566288] ? lock_downgrade+0x560/0x560 [ 407.570430] ? lock_acquire+0x10f/0x380 [ 407.574396] ? check_preemption_disabled+0x34/0x160 [ 407.579405] ? __fget+0x22b/0x3a0 [ 407.582884] SyS_vmsplice+0x12f/0x150 [ 407.586691] ? default_file_splice_write+0x80/0x80 [ 407.591610] do_syscall_64+0x19b/0x4b0 [ 407.595510] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.600731] RIP: 0033:0x457569 [ 407.603909] RSP: 002b:00007f052fd0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 407.611608] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 407.618868] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 407.626134] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 407.633397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f052fd0b6d4 [ 407.640662] R13: 00000000004c4f4d R14: 00000000004d8520 R15: 00000000ffffffff [ 407.648272] Kernel Offset: 0x31200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 407.659180] Rebooting in 86400 seconds..