x889\xbc/\x00\x00\x00\"\xa4I>\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:26 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 03:48:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 03:48:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) 03:48:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:31 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:32 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: execveat(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[0x0, &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', 0x0, &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', 0x0], 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x0, 0x2, 0x6, 0x2, 0x48, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545b"}, 0x52, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)) 03:48:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:32 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x147002, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 03:48:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c3"], 0xd9) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0x0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:41 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x0, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b"], 0xda) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x0, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6"], 0xdc) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x0, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x0, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0x0, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:48:56 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:48:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x0, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x0, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:15 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cbbddd7c"], 0xd) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 1148.622830] audit: type=1400 audit(2000000961.401:61): avc: denied { setattr } for pid=9196 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=238123 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="02", 0x1) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\r\x00\x00\x00\a'], 0x5) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, 0x0, 0x0, 0x240, 0x0, 0x0) 03:49:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:44 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de1"], 0x70) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121"], 0xa8) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33"], 0x7) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:50 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:50 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b5"], 0x8) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lstat(&(0x7f0000000980)='./file0/file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) 03:49:54 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:54 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) [ 1181.792023] FAT-fs (loop5): codepage cp437 not found 03:49:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b5"], 0x8) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) [ 1181.905418] audit: type=1400 audit(2000000994.691:62): avc: denied { map } for pid=12864 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=5460 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1181.957411] [ 1181.959085] ====================================================== [ 1181.965399] WARNING: possible circular locking dependency detected [ 1181.971718] 4.14.154+ #0 Not tainted [ 1181.975422] ------------------------------------------------------ [ 1181.981740] syz-executor.5/12867 is trying to acquire lock: [ 1181.987444] (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000a4693b17>] shmem_fallocate+0x150/0xae0 [ 1181.996918] [ 1181.996918] but task is already holding lock: [ 1182.002893] (ashmem_mutex){+.+.}, at: [<000000004cf1fac2>] ashmem_shrink_scan+0x53/0x4f0 [ 1182.011408] [ 1182.011408] which lock already depends on the new lock. [ 1182.011408] [ 1182.019734] [ 1182.019734] the existing dependency chain (in reverse order) is: [ 1182.027380] [ 1182.027380] -> #2 (ashmem_mutex){+.+.}: [ 1182.033390] __mutex_lock+0xf7/0x13e0 [ 1182.037707] ashmem_mmap+0x4c/0x450 [ 1182.041853] mmap_region+0x7d9/0xfb0 [ 1182.046091] do_mmap+0x548/0xb80 [ 1182.050062] vm_mmap_pgoff+0x177/0x1c0 [ 1182.054463] SyS_mmap_pgoff+0xf4/0x1b0 [ 1182.058873] do_syscall_64+0x19b/0x520 [ 1182.063279] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1182.068985] [ 1182.068985] -> #1 (&mm->mmap_sem){++++}: [ 1182.074977] down_read+0x37/0xa0 [ 1182.078865] __do_page_fault+0x8a4/0xbb0 [ 1182.083449] page_fault+0x22/0x50 [ 1182.087428] iov_iter_fault_in_readable+0x162/0x350 [ 1182.092970] generic_perform_write+0x158/0x460 [ 1182.098077] __generic_file_write_iter+0x32e/0x550 [ 1182.103535] generic_file_write_iter+0x36f/0x650 [ 1182.108815] __vfs_write+0x401/0x5a0 [ 1182.113058] vfs_write+0x17f/0x4d0 [ 1182.117114] SyS_pwrite64+0x136/0x160 [ 1182.121438] do_syscall_64+0x19b/0x520 [ 1182.125842] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1182.131568] [ 1182.131568] -> #0 (&sb->s_type->i_mutex_key#10){+.+.}: [ 1182.138353] lock_acquire+0x12b/0x360 [ 1182.142673] down_write+0x34/0x90 [ 1182.146640] shmem_fallocate+0x150/0xae0 [ 1182.151216] ashmem_shrink_scan+0x1ca/0x4f0 [ 1182.156054] ashmem_ioctl+0x2b4/0xd20 [ 1182.160369] do_vfs_ioctl+0xabe/0x1040 [ 1182.164772] SyS_ioctl+0x7f/0xb0 [ 1182.168676] do_syscall_64+0x19b/0x520 [ 1182.173084] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1182.178785] [ 1182.178785] other info that might help us debug this: [ 1182.178785] [ 1182.186919] Chain exists of: [ 1182.186919] &sb->s_type->i_mutex_key#10 --> &mm->mmap_sem --> ashmem_mutex [ 1182.186919] [ 1182.198484] Possible unsafe locking scenario: [ 1182.198484] [ 1182.204537] CPU0 CPU1 [ 1182.209193] ---- ---- [ 1182.213849] lock(ashmem_mutex); [ 1182.217296] lock(&mm->mmap_sem); [ 1182.223347] lock(ashmem_mutex); [ 1182.229316] lock(&sb->s_type->i_mutex_key#10); [ 1182.234085] [ 1182.234085] *** DEADLOCK *** [ 1182.234085] [ 1182.240140] 1 lock held by syz-executor.5/12867: [ 1182.244883] #0: (ashmem_mutex){+.+.}, at: [<000000004cf1fac2>] ashmem_shrink_scan+0x53/0x4f0 [ 1182.253644] [ 1182.253644] stack backtrace: [ 1182.258140] CPU: 1 PID: 12867 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1182.265228] Call Trace: [ 1182.267813] dump_stack+0xe5/0x154 [ 1182.271350] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 1182.276714] __lock_acquire+0x2f5f/0x4320 [ 1182.280859] ? retint_kernel+0x2d/0x2d [ 1182.284748] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1182.290343] ? trace_hardirqs_on+0x10/0x10 [ 1182.294575] ? mark_held_locks+0xa6/0xf0 [ 1182.298632] ? retint_kernel+0x2d/0x2d [ 1182.302530] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1182.307793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1182.312564] lock_acquire+0x12b/0x360 [ 1182.316370] ? shmem_fallocate+0x150/0xae0 [ 1182.320607] down_write+0x34/0x90 [ 1182.324057] ? shmem_fallocate+0x150/0xae0 [ 1182.328293] shmem_fallocate+0x150/0xae0 [ 1182.332349] ? lock_acquire+0x12b/0x360 [ 1182.336326] ? avc_has_perm_noaudit+0x8b/0x2d0 [ 1182.340908] ? shmem_setattr+0x7a0/0x7a0 [ 1182.344969] ? mark_held_locks+0xa6/0xf0 [ 1182.349721] ? retint_kernel+0x2d/0x2d [ 1182.353605] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1182.358622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1182.363373] ? retint_kernel+0x2d/0x2d [ 1182.367258] ? shmem_setattr+0x7a0/0x7a0 [ 1182.371489] ashmem_shrink_scan+0x1ca/0x4f0 [ 1182.375810] ashmem_ioctl+0x2b4/0xd20 [ 1182.379609] ? retint_kernel+0x2d/0x2d [ 1182.383501] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 1182.387996] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 1182.392491] do_vfs_ioctl+0xabe/0x1040 [ 1182.396468] ? selinux_file_ioctl+0x426/0x590 [ 1182.400962] ? selinux_file_ioctl+0x116/0x590 [ 1182.405459] ? ioctl_preallocate+0x1e0/0x1e0 [ 1182.409863] ? selinux_socket_sock_rcv_skb+0x610/0x610 [ 1182.415135] ? __fget+0x210/0x370 [ 1182.418594] ? lock_downgrade+0x630/0x630 [ 1182.422736] ? lock_acquire+0x12b/0x360 [ 1182.426703] ? check_preemption_disabled+0x35/0x1f0 [ 1182.431715] ? check_preemption_disabled+0x35/0x1f0 [ 1182.436736] ? security_file_ioctl+0x7c/0xb0 [ 1182.441142] SyS_ioctl+0x7f/0xb0 [ 1182.444507] ? do_vfs_ioctl+0x1040/0x1040 [ 1182.448652] do_syscall_64+0x19b/0x520 [ 1182.452540] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1182.457729] RIP: 0033:0x45a639 [ 1182.460910] RSP: 002b:00007f0a07285c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1182.468613] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 1182.475878] RDX: 0000000000000000 RSI: 000000000000770a RDI: 0000000000000005 [ 1182.483143] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1182.490426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a072866d4 [ 1182.497689] R13: 00000000004c1db8 R14: 00000000004d5aa8 R15: 00000000ffffffff 03:49:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43"], 0xc4) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b5"], 0x8) sendfile(r3, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:55 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 03:49:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:55 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 03:49:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) fchdir(r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f00000001c0)=0x800a74, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) r5 = getpgid(0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x2, @mcast2}}}, 0x84) syz_open_procfs(r5, &(0x7f0000000140)) unshare(0x4040000000) clock_gettime(0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x18) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setown(r0, 0x8, r5) io_setup(0x800, &(0x7f00000004c0)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="0105296dccf58ac123332eccc01200000800061085ca0000fb72e90d52f500791b80ff0f0000e17ae8d000b4a7d182c25321fe4000000000000000000000000023000000000000f92ff97342be04ba9d286ffd13c3b259427987b7ffbb3c3d8a76c3334cde68c939ba340e409b0600000000000000ec00000000000000000000000000000043e0d32cbb93999182bb1500"], 0x1}}, 0x8000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xffffff25) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 03:49:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:49:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:49:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) fchdir(r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f00000001c0)=0x800a74, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) r5 = getpgid(0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x2, @mcast2}}}, 0x84) syz_open_procfs(r5, &(0x7f0000000140)) unshare(0x4040000000) clock_gettime(0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x18) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setown(r0, 0x8, r5) io_setup(0x800, &(0x7f00000004c0)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="0105296dccf58ac123332eccc01200000800061085ca0000fb72e90d52f500791b80ff0f0000e17ae8d000b4a7d182c25321fe4000000000000000000000000023000000000000f92ff97342be04ba9d286ffd13c3b259427987b7ffbb3c3d8a76c3334cde68c939ba340e409b0600000000000000ec00000000000000000000000000000043e0d32cbb93999182bb1500"], 0x1}}, 0x8000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xffffff25) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 03:49:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:50:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) fchdir(r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f00000001c0)=0x800a74, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) r5 = getpgid(0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x2, @mcast2}}}, 0x84) syz_open_procfs(r5, &(0x7f0000000140)) unshare(0x4040000000) clock_gettime(0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x18) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setown(r0, 0x8, r5) io_setup(0x800, &(0x7f00000004c0)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="0105296dccf58ac123332eccc01200000800061085ca0000fb72e90d52f500791b80ff0f0000e17ae8d000b4a7d182c25321fe4000000000000000000000000023000000000000f92ff97342be04ba9d286ffd13c3b259427987b7ffbb3c3d8a76c3334cde68c939ba340e409b0600000000000000ec00000000000000000000000000000043e0d32cbb93999182bb1500"], 0x1}}, 0x8000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xffffff25) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 03:50:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:50:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a7"], 0xd2) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x1400, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r3, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:50:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000700)='selinux)vboxnet1bdev,\x00', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14, 0x10, 0xb2d, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000500)='security.evm\x00', 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) fchdir(r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/policy\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r4, 0x11, 0x0, &(0x7f00000001c0)=0x800a74, 0x4) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) r5 = getpgid(0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x2, @mcast2}}}, 0x84) syz_open_procfs(r5, &(0x7f0000000140)) unshare(0x4040000000) clock_gettime(0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x18) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000780)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setown(r0, 0x8, r5) io_setup(0x800, &(0x7f00000004c0)) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="0105296dccf58ac123332eccc01200000800061085ca0000fb72e90d52f500791b80ff0f0000e17ae8d000b4a7d182c25321fe4000000000000000000000000023000000000000f92ff97342be04ba9d286ffd13c3b259427987b7ffbb3c3d8a76c3334cde68c939ba340e409b0600000000000000ec00000000000000000000000000000043e0d32cbb93999182bb1500"], 0x1}}, 0x8000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xffffff25) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 03:50:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="00000000000000000000000000798738d997d4a092b09939c117bca00cfb130043e783b358f71c5561c182634c1941455670bc9a15aaa492da4958a4e511f6eecc093bcbe2873f1d4f4ae50b6769e77cf9df5c58ff31d1dba68e002b64d9486579dd183a6353e1264826e8eee5880de19d01c1dfb126f299b559eb6b3d59361254109bda8751e02bd89ca3aa34f479df221bbae1d2145de7c526a7a401c43e72e38e125d00af3121ac633a7f304340be80b593560b0da716d451c9cb93d03c6020774d43ce6f647119c9aa124712b51cf3a770d160c24937c36b16a6cb"], 0xdd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(0x0, 0x1400, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x4200, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64=r2]], 0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00"], 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 03:50:04 executing program 0: socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000002c0)='\x81lo\\vboxnet0J+vmnet0GPL\x00', &(0x7f0000000300)='\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f00000008c0)='selfusercgroupvmnet0\x00', &(0x7f0000000840)='GPLsecurityvboxnet0p\x00_\xad\xb1\x04GO\x1eS\x1c\xe7^\xdb\xe9^\xf0\'\x92[K\x86\x82 j\xaa\xa5|D\xc4\xa8Tf\xfa\xd3\xfdb\x9f{\x80u\xab#B\xdb\xe4\x1ak\xab<\xd8M\x04\xf1\xdfKz\xdf\xa5\x81\xb6\x18\xbd\xf9\xee$ \x9f3\xe0\xea{\xd1\x11\x8b\x10Q@\x0f\n\x9b\xd0a\x97\x12\x9bw\b\xa8\xda\xca', &(0x7f0000000740)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00'], &(0x7f0000000480)=[&(0x7f0000000380)='em1proc!\'\'\x00', &(0x7f0000000280)=',eth1trust\x98x-\n\x1d\x8aL~\b\xf2\xc3:\x87\n\xd5ed\x00', &(0x7f0000000400)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', &(0x7f0000000440)='\x00'], 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="140002002dbd7000fd00000000244e00591f377ba59eea06000eca7aee42823899be50ee2bae357f044ebf66341b39aa6ebdc87d63729d4de2993732e0347781e9f4e5248a473c8561c04a7b1cc629c75d19002b21dbeffcc453390da01cd49cd94cb10a7b0c0d65854739389ce0efc04226c7b26d33907c250ce3df839beebf072975482f68e7c17f9e97bab454d7d449dcf31206b2ae35ecb0658f0082f2e5474bb16ecd2239cf5b35ddc539fbbe72a43bd931e47bc174fca4185b62647437d832c67eb4ddb954686ee4f926d92ec09c671a9c3e99fbe0dfe4c3f6d199533ebe29de4248800e17992f776163c2000004ba529cd9a889b8586ac29fd3a4b41c3127c489398c7dd9d5c3c05e"], 0x1}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) creat(&(0x7f00000004c0)='./bus\x00', 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x0, 0xffffffffffff02c0, 0x80000001, 0x3, 0x3ff, 0x800, 0x8001}, r0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000500)='security.evm\x00', &(0x7f0000000b00)=@v2={0x3, 0x2, 0x6, 0x2, 0xa4, "38a52bc437e19f509ea42f4f5c3698db12a089652a2012706eb601fa4afbeb3d522512679ceeb5980af6e2eae9ad79ef6a062021348b431e10e0881943e5809f56db3a59f30a545bce2700deaee9360ce9d6fa23b6c5665d5a6627edf7d02a0422e43b4d15291a3d6fedbaf22fd1f7fbedd93e42f89b139c09a8a6dfa5b054274365d08f2d76ff188843c78b1a17d71e1ea8a9cc3824ae44553801f5786431471d630731"}, 0xae, 0x7) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="3494f4c85f6e388b7e63cc0155ef4b8a98df329a6d38a9570c1bb095fd62624edb9515e1bda2a2c3edac8f4f85d3c83433834af823156f9304c25b0b78012b886583445cc54e0d0db6fea4d7ce96224fa7bdadd01ca2e0f6e7f70148c6b558eaaac0509f441db1093dedbfebf0815f9cc293ab322a620693a5f0272fd789b35262e446712169518363a53ec66e6c2e", 0x8f, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:50:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x400000000003}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0xa) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x9, 0x8, 0x7, 0x3f, 0x0, 0x8, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x10300, 0xffffffffffff02c0, 0x80000001, 0x0, 0x3ff, 0x800, 0x8001}, 0x0, 0x7, 0xffffffffffffffff, 0x40d23ca61d7c23aa) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11})