x889\xbc/\x00\x00\x00\"\xa4I>\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 03:48:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 03:48:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 03:48:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x147002, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 03:48:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 1148.622830] audit: type=1400 audit(2000000961.401:61): avc: denied { setattr } for pid=9196 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=238123 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:44 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:50 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b5"], 0x8) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lstat(&(0x7f0000000980)='./file0/file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) 03:49:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) [ 1181.792023] FAT-fs (loop5): codepage cp437 not found 03:49:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b5"], 0x8) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) [ 1181.905418] audit: type=1400 audit(2000000994.691:62): avc: denied { map } for pid=12864 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=5460 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1181.957411] [ 1181.959085] ======================================================