[?25l[?1c7[ ok 8[?25h[?0c. [ 91.809477] audit: type=1800 audit(1546062814.867:25): pid=11068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 91.828645] audit: type=1800 audit(1546062814.867:26): pid=11068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 91.848081] audit: type=1800 audit(1546062814.887:27): pid=11068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2018/12/29 05:53:49 fuzzer started 2018/12/29 05:53:54 dialing manager at 10.128.0.26:37381 2018/12/29 05:53:54 syscalls: 1 2018/12/29 05:53:54 code coverage: enabled 2018/12/29 05:53:54 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/12/29 05:53:54 setuid sandbox: enabled 2018/12/29 05:53:54 namespace sandbox: enabled 2018/12/29 05:53:54 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/29 05:53:54 fault injection: enabled 2018/12/29 05:53:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/29 05:53:54 net packet injection: enabled 2018/12/29 05:53:54 net device setup: enabled 05:57:17 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000001700), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000140)=@nl=@unspec={0x0, 0x0, 0x3000000, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000001680)="235db863768606681d012f629c75adfa4208d51e67688d024aface6a6ac7d846ed2fa163e15ffb509de805652b4152fefffeffc0d4f83047fda99590d719ccb4f47bcd84c8f41a85a8446446bb4178740a8bd45ff8a106da98c21372", 0x5c}], 0x1}, 0x0) syzkaller login: [ 315.741729] IPVS: ftp: loaded support on port[0] = 21 [ 317.134181] chnl_net:caif_netlink_parms(): no params data found [ 317.731008] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.737615] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.745987] device bridge_slave_0 entered promiscuous mode [ 317.831542] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.838221] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.846378] device bridge_slave_1 entered promiscuous mode [ 318.100431] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:57:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = msgget$private(0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r2, 0x0) accept$inet6(r1, 0x0, 0x0) [ 318.187986] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 318.635212] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 318.644169] team0: Port device team_slave_0 added [ 318.777742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 318.786376] team0: Port device team_slave_1 added [ 318.928864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 319.082304] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 319.690541] IPVS: ftp: loaded support on port[0] = 21 [ 319.708370] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 319.917066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 321.555080] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 321.957342] chnl_net:caif_netlink_parms(): no params data found 05:57:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) [ 323.024922] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.031482] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.039975] device bridge_slave_0 entered promiscuous mode [ 323.236389] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.243026] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.251164] device bridge_slave_1 entered promiscuous mode [ 323.747116] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 323.923992] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 324.432723] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 324.441399] team0: Port device team_slave_0 added [ 324.484124] IPVS: ftp: loaded support on port[0] = 21 [ 324.645490] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 324.654229] team0: Port device team_slave_1 added [ 324.792985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 324.968886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 325.654899] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 325.812231] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 327.259807] chnl_net:caif_netlink_parms(): no params data found [ 327.675321] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 328.270895] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.277538] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.286041] device bridge_slave_0 entered promiscuous mode [ 328.451116] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.457863] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.466138] device bridge_slave_1 entered promiscuous mode [ 328.728818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.926053] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 329.102113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 329.391015] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 329.641616] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 329.650495] team0: Port device team_slave_0 added [ 329.831636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 329.840399] team0: Port device team_slave_1 added [ 330.000349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 330.019793] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 330.026143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.034350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.203958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 330.721248] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 330.727557] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.746465] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 330.939976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 05:57:34 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @dev}, @remote, @mcast1, 0x0, 0x0, 0x0, 0x106}) add_key$user(0x0, 0x0, &(0x7f0000000080)="5b9cd2a284f7a1b6405e5ff517d3626ad06915e517adeb62acba5447579965c6a7295bb366827546587ea8bd41e186acb91c2039962f63c29c", 0x39, 0xfffffffffffffff9) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 331.389769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 331.397022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.406016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.414512] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.421010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.483407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.165294] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 332.173134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.182070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.190570] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.197185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.001040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 333.008176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 333.217246] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 333.339395] IPVS: ftp: loaded support on port[0] = 21 [ 333.913951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 333.921068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 334.695618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 334.702755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 334.712150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 334.738490] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 335.375879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.522696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 335.529774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 335.539134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.190735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 336.324187] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 336.331092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 336.340111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.737353] chnl_net:caif_netlink_parms(): no params data found [ 337.005334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 337.011980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.019765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.078821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 337.093644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.102422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.704585] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 337.710728] 8021q: adding VLAN 0 to HW filter on device team0 [ 338.480386] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.487038] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.495393] device bridge_slave_0 entered promiscuous mode [ 338.623668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 338.630863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.639894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.648893] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.655459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.709530] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.716137] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.724661] device bridge_slave_1 entered promiscuous mode [ 338.772898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 339.367091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 339.374409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.383461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.392053] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.398567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.587292] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 339.819721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 340.170346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 340.178782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.541283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 340.550052] team0: Port device team_slave_0 added [ 340.751723] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 340.760616] team0: Port device team_slave_1 added [ 341.007794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 341.015707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 341.034777] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 341.256513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 341.526203] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 341.899328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 341.906528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 341.915916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 341.948936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 341.955477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 05:57:45 executing program 4: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c4e2c997584263420fe2e33e0f1110c442019dcc72d32793bb27") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, r1, r3, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r2, r3}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, r1, r3, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, r1, r3, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 347.220219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 347.227492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.236254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.244627] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.251143] bridge0: port 2(bridge_slave_1) entered forwarding state 05:57:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, r1, r3, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r2, r3}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, r1, r3, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, r1, r3, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 348.193898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 348.200944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:57:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, r1, r3, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r2, r3}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, r1, r3, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, r1, r3, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 349.099680] chnl_net:caif_netlink_parms(): no params data found [ 349.193243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 349.200278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 05:57:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, r1, r3, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r2, r3}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, r1, r3, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, r1, r3, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 349.583246] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 350.188974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 350.196088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 350.205154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 350.250672] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 05:57:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) [ 350.720629] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.727237] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.735687] device bridge_slave_0 entered promiscuous mode [ 350.974901] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.981495] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.990031] device bridge_slave_1 entered promiscuous mode [ 351.251735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 351.258830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.267947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.420014] 8021q: adding VLAN 0 to HW filter on device batadv0 05:57:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, r1, 0x0, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, r1, 0x0, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, r1, 0x0, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 351.712968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 351.980286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 352.292188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 352.299176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 352.307804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 05:57:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 352.821165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 352.830066] team0: Port device team_slave_0 added 05:57:56 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000002640)=ANY=[@ANYRES32=0x0, @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000001540)=ANY=[@ANYPTR64, @ANYRES64=0x0, @ANYRES16=0x0], @ANYPTR64=&(0x7f0000001580)=ANY=[@ANYRES64], @ANYRESDEC=0x0, @ANYRES64, @ANYRES32, @ANYBLOB="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", @ANYPTR64, @ANYRESOCT, @ANYRESHEX], @ANYRESDEC, @ANYRESDEC], 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) sendto$inet(r1, &(0x7f0000000040)="096fcddc459ae8752d193b2110bf15305e54eda67d93d3e9236b677d2e43f382321ef9370563e4a074a647178ca21e394ff62f6ee722f36c192c5dec0521a0c05f0770b45bb4b8dbeb9f34484f261e42089778eced692b00b1782497443dbf57a15cfb714ae5582e84eab1c7458f637b6214cc57e12b5b4dffa8d0642ccb9bff5eb6d7293b18c66b20952ee6d3f91e9e2598931bbd37c6780947f870c940cdfff3f5a7c7576767b252bb45a57fe2bc7ae79b9c0d140eb9a18d", 0xb9, 0x84, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @initdev}, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast2, @in=@empty}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000980)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000980}, 0xfffffffffffffde5, &(0x7f00000009c0)={&(0x7f0000000840)=@newpolicy={0x0, 0x13, 0x200, 0x70bd2a, 0x25dfdbfe, {{@in=@empty, @in=@broadcast, 0x4e20, 0x1, 0x4e24, 0x5, 0xa, 0x20, 0x80, 0x21, 0x0, r2}, {0x9, 0xf0, 0x3acf, 0x13, 0x2, 0x101, 0x6, 0x80000000}, {0x2, 0x80000001, 0x8, 0xffffffffffffffe0}, 0x6, 0x6e6bb8, 0x3, 0x1, 0x2, 0x1}, [@address_filter={0x0, 0x1a, {@in=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa, 0xff, 0x80000000}}, @output_mark={0x0, 0x1d, 0x1}, @tfcpad={0x0, 0x16, 0x9}, @etimer_thresh={0x0, 0xc, 0x5}, @ipv6_hthresh={0x0, 0x4, {0x3f, 0x2f}}, @extra_flags={0x0, 0x18, 0x6f58}]}, 0x5dcde124bff8aab2}, 0x1, 0x0, 0x0, 0xfffffffffffffe}, 0x80) [ 353.127475] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 353.136283] team0: Port device team_slave_1 added [ 353.267681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 353.274764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.283558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.388431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 353.664357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 354.246787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 354.415159] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 355.341046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.786053] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 355.975238] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 356.065013] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 356.260687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 356.267098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.275015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.723496] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 356.729638] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.094374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 357.101575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.110314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.118682] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.125311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.163356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.311431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.617482] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 357.624737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.633445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.641782] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.648330] bridge0: port 2(bridge_slave_1) entered forwarding state 05:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) [ 358.229006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 358.236130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 358.696885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 358.704024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.048460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 359.056410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.065597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.076238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.383229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 359.390246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.399423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.713357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 359.720245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.728783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.045050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 360.052079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.060500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.602072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.951767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 361.295591] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 361.302010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.309746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.655475] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 361.661609] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.680780] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 361.986089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 361.993397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.002210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.010631] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.017182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.029898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.327957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 362.335288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.343983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.352428] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.358933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.472808] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.663314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 362.670354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 05:58:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) pselect6(0x40, &(0x7f0000000300)={0x6, 0x0, 0x1f, 0x0, 0x42e5, 0x7fff, 0x8000, 0x8}, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x0}) [ 362.950243] ptrace attach of "/root/syz-executor3"[13032] was attempted by "/root/syz-executor3"[13033] [ 363.019312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 363.026420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 363.247367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 363.254439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 363.263511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.272978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 363.455438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 363.462971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.472114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 363.652890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 363.659770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.668223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.845307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 363.852382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.860851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.769845] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 365.187832] 8021q: adding VLAN 0 to HW filter on device batadv0 05:58:08 executing program 4: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c4e2c997584263420fe2e33e0f1110c442019dcc72d32793bb27") r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) 05:58:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)) 05:58:08 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x5a}, 0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x8}, 0x4) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000140)={0x80, 0x3, 0xffffffffffff6318, 0x4}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x19) sendto(r1, &(0x7f0000000180)="320eae4b2d", 0x5, 0x8040, &(0x7f00000001c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x80) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000240)=0x3) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000280)=""/95) r2 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0xffffffffffffff10, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000340)=""/66) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000005c0)={0xe0000013}) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000600)={0x1, 0xffffffffffffffff}, 0x2) fcntl$getownex(r2, 0x10, &(0x7f0000000640)={0x0, 0x0}) setpriority(0x3, r3, 0x80) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000680)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000006c0)={r4, 0x80000, r1}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000700)={{0xa, 0x4e24, 0x0, @remote, 0x5}, {0xa, 0x4e24, 0x7fff, @remote}, 0x2, [0xbbdb00, 0x800, 0x3, 0x3ff, 0x0, 0x8, 0x7, 0x7fff]}, 0x5c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000000840)=0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000880)={r5, 0x9, 0x30, 0x1f, 0x80000001}, &(0x7f00000008c0)=0x18) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000900), 0x2) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000940)=0x1) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000980)={@in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x24}, 0x3}}, 0x0, 0x1000, 0x0, "222ab19e24cf19b834733826e4678fa25a8f1d63b1db31f94d9aaac375bbac4a49207c3660f80833c89d915d2863011644e053ad98c1d24e82b59d575759d9547879425d2da49d3af643fbdb1af30ff4"}, 0xd8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000a80)={0x40000002}) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000ac0)=@assoc_value={r6, 0x4a40}, 0x8) write$P9_RUNLINKAT(r1, &(0x7f0000000b00)={0x7, 0x4d, 0x1}, 0x7) 05:58:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 05:58:08 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000066000)=',', 0x1}], 0x1) tee(r1, r0, 0x5, 0x0) 05:58:08 executing program 1: socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getgid() listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) close(0xffffffffffffffff) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) epoll_create1(0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) 05:58:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 05:58:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:58:09 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, 0x0, 0x0) r3 = accept4$unix(r1, 0x0, 0x0, 0x80800) lstat(0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) 05:58:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RMKNOD(r2, 0x0, 0x0) getpid() write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000000)={0x16, 0x6f, 0x2, {0x1, [{0x92, 0x0, 0x4}]}}, 0x16) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r3, 0x0, 0x0) 05:58:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x11, &(0x7f0000000000)="7ad669da093e6b1e3f6f7798f965dee31d"}) 05:58:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) [ 367.025328] IPVS: ftp: loaded support on port[0] = 21 [ 367.889402] chnl_net:caif_netlink_parms(): no params data found [ 368.227902] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.234562] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.242293] device bridge_slave_0 entered promiscuous mode [ 368.292278] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.298721] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.306604] device bridge_slave_1 entered promiscuous mode [ 368.460969] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 368.515695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 368.666607] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 368.674611] team0: Port device team_slave_0 added [ 368.725524] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 368.734845] team0: Port device team_slave_1 added [ 368.785759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 368.836443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 369.032073] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 369.085005] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 369.624212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 371.580716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.794384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 371.976093] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 371.982469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.990232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.170493] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 372.176672] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.359439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 372.366814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.375849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.384333] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.390840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.399035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.569588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 372.576848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.585889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.594840] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.601354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.776679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 372.783906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 372.977865] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 372.985129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.170537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 373.177724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 373.186973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.196454] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 373.373721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 373.380685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 373.389897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.580980] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 373.588090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 373.596699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.780856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 373.787725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 373.796447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.707757] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 375.121126] 8021q: adding VLAN 0 to HW filter on device batadv0 05:58:18 executing program 2: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, &(0x7f0000000100)="792cbf") 05:58:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) 05:58:18 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 05:58:18 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, 0x0, 0x0) getegid() shmctl$IPC_STAT(r0, 0x2, &(0x7f00000003c0)=""/118) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) stat(0x0, &(0x7f0000000580)) getresuid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, 0x0, 0x0) bind(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 05:58:18 executing program 3: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x1042000, &(0x7f0000000180)='rxrpc\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 05:58:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0xffd8) [ 375.603154] hrtimer: interrupt took 30820 ns 05:58:18 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$IPC_RMID(r0, 0x0) 05:58:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x10000) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={0x0, 0xeaffffff00000000, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x5}, 0x1c}}, 0x0) 05:58:19 executing program 5: ioprio_set$pid(0x0, 0x0, 0x800003ffe) 05:58:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) 05:58:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) 05:58:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:58:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x0, 0x10000) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={0x0, 0xeaffffff00000000, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x5}, 0x1c}}, 0x0) [ 376.340217] syz-executor4 (13574) used greatest stack depth: 53080 bytes left 05:58:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @loopback, @multicast2}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) 05:58:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:19 executing program 3: r0 = open(&(0x7f0000000040)='./file1\x00', 0x400040, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001f00)) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000180)={0x3df, {{0xa, 0x4e24, 0x100, @mcast2, 0x90}}, {{0xa, 0x4e22, 0x1, @local, 0x5}}}, 0x108) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) utime(0x0, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 05:58:19 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="18000000000000000000000000000800"], 0x0, 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 05:58:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) 05:58:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0, 0x0) read(r0, &(0x7f0000000880)=""/4096, 0x1000) 05:58:19 executing program 3: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f00000001c0)=""/179, &(0x7f0000000040)=0x428) 05:58:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r0, r1}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r1, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r1, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:19 executing program 5: ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfed0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0}, 0x0) getresuid(0x0, 0x0, 0x0) dup3(r1, r2, 0x0) prctl$PR_GET_TSC(0x19, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000002c0)=""/35) semget$private(0x0, 0x3, 0x84) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) 05:58:20 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) semget$private(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) syncfs(0xffffffffffffffff) writev(r1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:58:20 executing program 4: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000745000)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 05:58:20 executing program 1: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = gettid() symlink(0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) lseek(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) syz_open_procfs$namespace(0x0, 0x0) tkill(r0, 0x1000000000016) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 05:58:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:20 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 05:58:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 05:58:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:20 executing program 1: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = gettid() symlink(0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) lseek(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) syz_open_procfs$namespace(0x0, 0x0) tkill(r0, 0x1000000000016) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 05:58:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)=0x2) dup2(r2, r1) 05:58:20 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffbf"], 0x2) sendfile(r0, r1, &(0x7f0000d83ff8), 0x2) 05:58:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:21 executing program 5: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000001a00)=ANY=[@ANYBLOB="0000000000000000a39c8071fd4fbde44d8eeb4891cb78ac0364a1fa99e6418ebe1771cc523c"], 0x26) 05:58:21 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvmsg(r0, 0x0, 0x2) semget$private(0x0, 0x0, 0x200) semctl$GETNCNT(0x0, 0x2, 0xe, 0x0) getpid() write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)) add_key(0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 05:58:21 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:58:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:21 executing program 4: r0 = open(0x0, 0x0, 0xc) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) r1 = socket$inet(0x10, 0x0, 0xfffffffffffffff9) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) close(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, 0x0) close(r2) getresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x0, 0x9, @mcast2}, {0xa, 0x0, 0x33, @remote, 0x7}, 0x0, [0x0, 0x0, 0x0, 0x6]}, 0x5c) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x2d8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) pivot_root(0x0, &(0x7f00000000c0)='./file1\x00') 05:58:21 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:58:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) 05:58:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x40040) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={0x0, 0xeaffffff00000000, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x5}, 0x1c}}, 0x0) 05:58:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) [ 378.403858] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:58:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) 05:58:21 executing program 4: r0 = userfaultfd(0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) mlock2(&(0x7f000035e000/0x4000)=nil, 0x4000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) 05:58:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x20000000000, 0x10007e) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000008c0)=[{&(0x7f0000000800)='U', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) 05:58:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:21 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x18b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000340)='\xd1?\xf3\xd7v') ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000500)={0x5, 0x5}) write$P9_RAUTH(r2, &(0x7f0000000280)={0x4, 0x67, 0x1, {0x0, 0xfffffffffffffffe, 0xffffffffffffffff}}, 0xffffffffffffffe8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000380)=0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getegid() setgroups(0x0, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000800), 0xffffffffffffffff) add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000900)="be4ec9fd54f1df7d4951cc0bfa6492204f15fe023af7b0312adb1a7f532cbe1324eb46ac474f4ee7cec8871d8658c83d9d32273b781f9674683dcbcdbb8fc331fe4272fc00a51756f461b3541f8f5cb5b6da6a6953f35b1c465e548663fcc79cbae60b5b022070ca73cdbba70e6cc3c9b55d95ba247b52169378fd344968025c993e7c7db5b8f5993c9fc0d75203d6560ad7437a2a31b740145d3a8cc89bf38707d3ac22e903c0f090847c8c6d06b1d3cf3649ebc2f4a926773a69b532bc1d6064c80bfd7d6129e531cc09f52de7a30e7dac4a16cc4b9aecf5fad636ecd5dc41d207413bf0ea96ec8dcbd45562cb6847f9cd94ab925bb88a18a740df07c265debd0c7ce786ea11563e638276a0450245e7a25ca40d4372889b7f88d6ed78b2f2e837dabbaffe7bcac730137a1f24650ef6f6518a53d5ca68e68fa446bda27922ecdd23def4570ed9235794482bf4be8d9213f416a996c02f8f00060854fdbb772abf0f32aa90f6fcab62d61b101649677acb4096c41cb3abbbb3dcbfe13ba11fb08cb8753ff84a8f5f4a98f090e2af74ac702940ee21869430a451a18c7551ec5555c2946a1fe0d7aeee90684e5246002f111a3e59faad71525ab46ed1b841fd9c92789e45225403f91fb68e81b6db0506d7b5af8328e63996f0e55591ea7f621148282e64bc3838f3717c17b6817ce837fc25945a37e6271956aca4d8371adeb4053ff604e675e438d18651e074e90c80ecb98e4c7bb56962659bcc234f23435851ca8871fdee613a8e3f178afcc035702258e9eae81923e1c9a8737c3fc6e79804f69f1de090856f5403ef88c244e6ea19cbfbc44a0aee996d0c0ef7c77a7cdc5b11490789130a805c0b006de71d0a8c29c249295bc120d7c6e12947cf296d53c07788e61203817343d16318a9793f51d8c73095d66db3cd2b1853805413adb61e6d29e506787af5e4f97130e92b07c7bfbf1688c63c27360375f36416ee00e63b6d1d5ecac4213f0e01c3db9482f65a314d9c1a9839e77cf75400f68312744482546a6879c222d857c838586740893955c3535f1cfc4c962efe45b3a90883bbe31e0e981b2777ac96e31aaa890aea15fef101eaad0cec1fa287b80efed54ed58cea37ef7660e7356b5bc9b4c75da1efa26797d40be9e35b10c52cec673e923db15e48d480d5a7efb51e0a3fe586c0b42daf88fbd66aa92cb0330ab1eda001f3660151e6d5a148521be3ad53f90c621e39001e8d7a12af8a0932f8791fd9064266e47147a5258951ea40004daddd2064a54aca5eb17ae91118898e0691cc651d75b6bc88a3af900a627343483ee1a6c1ab3417bfa635087afbed4d6fec6055c7d6f16aa77fc2e8890c1e850aae7e68cb27d23139127580d51bcee3fe7cb3328212a78c946428983214e8e5e2a6f7bfe56dc2438cee0df2c729f854adaa5496dffce92e7340f3aa3b27964d97f9aa3895d6217809468c7ad16004b4d2eb86a77d8d9c36243eb1060cd530086fea03db258a3c6e5fd6aff7d81ac0ecb3342a6eea18d0cc530c44dd55d7287bad684f758e6346b980bba8effe9c59f7415ac33ac5f323b46e70baa27bb302147f9bfa21eeadf54ecc9b3e03aeede807fc773c64b3e9c1711b7bdb4c3eca20bcf5395549299a50ce5a61c80653f95ebc40149475255a4468aaef36ea3e140712504a78b67fe8707b07929248fd17716b0ac3bbbe01d2f53ca1d3b1b66486fc5a348df6ed7f89201bc569a09aae6a366555341cd12943afb9433c94e9c3a67fe68c77bb050a4a433c620117f5c44a686939f653aedd5396a849056803d7c09b293dd9b11b559f1372f5af6729aeb11bfb6386f9907302f47f43ce67cb89d323e04954e2e1d8ca29b6cf5d262dfe61d5278b815e475d79f5a4e721f9874ea0521953f4bd64c4ae6c30e84f59da0c531ddb25b6ec0b58ad72ded4a7325486e1b603814c45d839b6f50e617a5dda44026b101254e9cfaed8e4e5c42d82746f09b69ccf5a192c071b80967c055e365d03f70d2434cc92fb88e3254f3008b8bb72049ea2c7d449a3d4e2403e1598639a711fb8fff14b6c1d80395651a8dae463e1c4c4641725daf702f082b7b3833cbf977f757a0e93385363fa67c0ebf2f185ee6b841332558076730d0e6abe26a5014c35857858ddd97ac107cbdf12922258388db0a81b9c155a126a564f7f0de3fec40d0a159d2f79f14709baf1b797f036cc3725aae1efc5b745332d91b84e3de757b6225dfd8765f48057be1af7f65842e646b8cd834044b520bd8192f514c0b147f400c3a88a9d61addcdf70dcfa9502a3a0b4d5cfee81e279257b24602204b48b9588ef08f3c265d5ed194d13816aaf740adafb162f0e59ea4644bb74245a8f2ff56ad0f9c90345d7e7d3a3c1e2b40e867fa57673a95af5424163e0f71f0754156945f865029a3dc68851b0f9b813169c869e53fa133a1912cf06f290ab88d24be8c13ca17bd8c4b9730cfd9200c206e05474afcf58bdd3a43255c989f146ebe4abab99a7a87adbbbdcb8fda1a864b9085f85cff10f5cc1ea3d0e5e725a8f39c9a3987364d99ee74f4e0c2a0035726afb1e42970c8aae021163ce239152465b6d328c5ac6b3180867fe776a25a211e3673e429a190291b037bcbac032edbaa3aa507fae21321e974cc80787fbf8eb814c7031d975c3e03c7420d18ed706a9461d9e043bce606284d6f968498c2cabd7d86bdfddd1e9cc8d8f8bbc7673417fcc859c965c595e8c884e8e2e65b5fb73fae149495e8e5e8db1b107d023fd9cee072b62a45b627f02086821160b134ca5e80b18ea923e3e3b5133d4eacc0ed3fd1682ad98f23cc9c113fef7943374041b9288e8b71b55ce82f3444ff0115cc95dc5fded78a87b625345b6c98185d142adb8ef824e726ef14b4fbefb1ace950443d6d8c05e771b5e2cddfa418eb63856be71fe8e07af993ed0a0d8d205bfae3cf50ae97099502b45de11fd7924ba1683d735c6f146beb047298c1575693591caa35e18ecb69b77f27d53b7039ccc525445f2315bf89b4a368c3002a3188695dff7b08f5686ce08eeb427452f118926c83c757d4349e52b9317a8b8048a2197c914028dfac8dc6437dd4ce44da6b36ccc8366133d691a9d9e13ad45d021247a75adbaefe20cf1e92bbf3b8e9178ac1e929e92a8e0377449e4617c2de345762d1700307e9408f38500a4103e4c22fe4d798372215ca8ae224a23ac5a42b30858cf944a87f3b9b1e459135adb18f3b1f410d8e445a263ec52d65896871aaa79a5d897c221357bb374082e12d80fac1486a91be05c7714598b56783eac01331e62c1280a59bfcaa92b71028a13e5d098bf7043d55e5e2068a8e91883435242aeab5c6fbce1718bee672a22e569ce720adef584acbd9ebca8aad3b36790c5610e27e28e0e95cacf5c74e81edc7e0fcd19bc0749f3cfd1ee9359b6f0c68b1453a3dc6c23aaa8099d0f98439c7fa72f6fb0c4a9ad7b40d095e1dff6e714099f0dd8a127702db693ec8a4dbb365f764c571c1d66f6f92b20bb82b4c968345b601f4fb2c7d8bb30ac1c05d4ac683775962dd2a3d9efd99c5d71dadc528e339bfac3953fcc45090eb7b9020daed3713a88a86804cbca7594d1514710710ac562ab3cf04de3180446eafec66b54dec0b79d25bdc54bc1a2db0cc7b9f2af5961e7c3dbbbe883bf9d8ef46951224d6976364134a8237d53b1f211da2077ae6447d904f62d621d3641c3d7069bcafc2fcf4cc5d814f059155e3e2fe4f9dfb27ae0e1839c080f22cc5d6d1c16d806d6b1aea91e7b9965e5538c9c9d7a689b4589f7af84ce7c56b1123264682219d838c8ed40afce6927b4a2e99cefc84d56c2d0b1f41064007b6707c568f76c0cd35c499e17a66b602de619a189ae2e37c0d9eb38028ed3ecfc15168550b2efc47069f1ad636dea4618ef3d55fe7a914799ec54203b00b8c49cb8dc7dd4643ad611b99e728142ae3062c332594777d256a0205c18425cad22deb185b958a1c23b73cfac9956da575b82ec75c0e57e5e48aaccd10ca3fd1453d5c67c3f36e3004dba96c098ae09c128346bf5e0fa37a38b9c45f9c3b8e94a8d77b7c8dba4acc3bf798a083f60cdb5eb3e3a027be427c359722292b6e9f73f7eed871c3794b9e358020dc452ef8e9822b12a0228d48175a12f7e155eafdc3ddd5b8ef0ad4b6746a5d99dcf9cdc801c8eed9987709084d1cb03f1bb0c40825d7ac69670835b27dd2f7878a83980671b43f6ff13c56425a016e087c4d96479b59342bbf5af6c580ba21fdeb66a48d0a78ff44508e6573e45497b61307cc2b610c6b23b99e65f9c892a8b356bfb50aab17c6e49331c4d694619ccf9cea8128e1a5057d2f1e9ec33011f11d780d2659a79ca89d4abb0da14237704db0408f9762a0a225ba7a66c018333f4130347a3d0cfb82cc49f189da8bedc9f48ca5c92729f01f57a750398b339b03a6fb7344c60514f58422d5cacf6f3d33184506beb9dbd03ce563e4865e2ed2fae50e249540eb404c9ae2af7445b73d5085b6fac15cb4980a671c7901d3ed297ee98f44b9fe484615aaf3fe3be2687be543ee5a9a0d2ad7eab23db4a48971f9bc732c008d118964ed4dbf4aeb23f20bce2f25989bd1d6f2a65c25d81e27afea6ed92356df8df131a799547914ce6c0a6e7a9d566ee164cfe4107786c4e7a581e81434f702b9120377a542435d527eae0ed5be7600bb4aa2ce4760f9c14ba761a761698e64e7eee473671747a971a6bc2f9fd108261388775dfa05afb62c9d894e1f5896775e4bc42f960b0a620fe491d1f48343f475b956b700941747dd77ecf963ebb4b9e41a201c528d3bc7b6b09dad19787fa90fa832f01ddfc85fd6f3167a3de1da64642f840ef431724c6c42b98fb7f5d864669628acb46ee60db44a82d6cc8f41db5d7f47eec9b52c1c8c1ca6edde75cad35e971fc18228be48f82e500485d7e467656beecb9ad9fbf710cf192be5ae8a9ff109684d5f0128868959823c9a6454917553f215467eb3202571c2d2503f0e54a35bc6ea8694393f9938b9944b746b2e60ba43997c87808f01f455b103d4f8ff3880ce6cdebd8805cb2576359959568c726f7a12cf83b73c1b4d057a13aeffc5f031131032b20e0d2a2bd8ba1b068585308c77cbae786b23aa81253f612714c1e85aa6f7e92461042aa29d4538b4385e9f8d804b5a4258fddc4f14bc965e6cddab991fad4b611c0f07c8a1bb15169ec9409c40c04ac8ed69921e73642a7e6171c704c1b9b97e984254af71facffc6005716218e4e6a5f8b09992047753624878f54d9e9f9619feb75017205dd941ca90e8738c93e467f37da8355168599c869e4345a8c42f8f605a25f3b9fe2a1a43db8b415603200e756e4db6ba07f39535b1460d5e6921cf80970d5ef0ac61a4f8fc9ce96171ee84c02b98051dfd72960e685948a505d7313c0a010bb0d8dd04521a889d6e0c2c2998abf7d6e3955b31e528536515d6489791eeec05bbee9d7a8e8db721e8ac74abd6dc69248a5347716566ea00708833254d52c93c7939745829cdd3fbd25c4a2c71c372d8b16303beb4f3a9424bc7ac4403a4954de6761614b354bc900c86c4930a9db5b3f8419c1d4ca241b7fa4ac5fa8f19f72b5c92bcc0f5bfbd8b3457c4c3d09826e681768e13e0e5cec82919890dedc638769b7853182c3c832569e11cd1e1a567fdc439c658faca391b739a73bcc7ca70ceaf8f4a33f0eacdc744acf5a1cbdc9cdf7361f4027eba61a3ee0a62060c29b8c09d7697356", 0x1000, 0xfffffffffffffffb) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000007c0), 0x10) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001900)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) ioprio_set$uid(0x3, r5, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000002980)="2edc81a5ca55dfaeeecdb9bf5f519c8e9773bbed7ff2f71b5892c9c614ef3c2ce9ac2f3b967298f297f5c1d4827ca890f4e9cdb8e29dbb18e8229a2f8c2b1334498dbcfbb548bf1bcd4d1ab682df5f7386850ede6dda49d78090e148938cd6700f40a05f85c17ee88548c409fd5f84cf822db99a8f2b999fcdb96a655e2ca9600cb6831c4d173ec2fe023957a437e453f1f66e8945256bdc0ab0a6b37b71b90c4f68406249ca1697c86c3f8b575dcb8583c045fda5751ce05427ac415529ea07665b689b1d081d70d35e1badec917364c69c7aa412ca51f1b20a9e038c7298960d60d8bb78d4269072d5c2ea229122564c7b0d8cf0f1e88ad7c973375d9ae6af3bbab11ac1709ad3ffa16c9cbe567f123acdca4e4b3441c4ef432b9e9905c5365f845509ae90e4c47853b8652d4a6903aa5b9e2250364fc0a5cde1372d72b6c02166b184ca8c995c41baf0f283e2a3b91f407c2a98d81c7952620d217fa5371aecab0e803bce9c7074d092be2f5308ba771e40cfb7cd7fd9d7d01f3de1917e513fff4d394699e419efd1f3f52898a5bcc57ca14189c91cbe570c4e6c5dc3b1bac065b8d8a1dbb3c9721395effff96cea404285fc0b325c5b31e3549f8474cac5932e9bb43e7d5501444a3363d5665181551be31110878862cd815abe00b27b0cfd4104fe3ab92f7fb3c324c56c4018ca84343ef911f2c104f8f75dbbd929fbff400b71ed6d177fe1d188f456f3942be58fc35b80c2819ae14cb050dadea468453b92f78579ec44e058eabbf944b71e534caa008b3638fe5684aaa24177137703d5281f949fed303bda3956e5ab81756b274d40863d2c131b44929fc2e5b046d295a1e6467f78870b460c226c731c34cf8da7988e7332eaf4033e96a7ae6c80f167a659d6414fc017ce99a5a1ba8922723b0db82fd602b1cd3b8a017f213bcdef4a8177578948e4ea0b72c2d14bbc36373fcf4426b3ebb23359535b287cd6697b2ae0a10bbd891be2a4f5ec52ff08444cf24cc92bdfd81c22baaeaf91907ec75e38d93730294e49866506d9fef5e4056c026cca4a24a6953a2f5977a037254d6733c49788c3288a89703782b518a4af7ebf850817638af8d3097ec94a80de9b9241f75e7988dff26e40675d3c6b51092ee1b6370a50cadef7eaf6ee486cdd4d2cb42565795f5cc9702b4695c4d3996ac47fe2b51085877808054e70b4809131b025d86702f7d70013bdb02e5e1864c2819f60ef317bc03c764f71aabc7238529453e3b1471e58f76348bba3c4f217702a4c05c8aa0c911066e4b0d1d214714943d8ed9183bc705ef3872c7c8462c4f5ed2fc7ab1030a5c2364c1894427682d722e24e4f7ff54f5c2604ec128b7b8491e0996ab059d93d63f3b2c333cee37d5a844c408610c5c3f10cf4ada4d82a353b8cdada1ac1f9460ca193b37236c1a79fc6d2bb446c25d76f084dc449769aa30f8daab9c0a2bb2084bb6dc5d7062ae36a42ad5a394694b88b3d1d3ce19fb0d25ff1ad24096e001042bff09a255eefe65e066fe6b472c37f4991ba0fbb5a8885a8d260f21e776c2160c26789016eedcf99aacff1d0222704694990faa46348ab77c0738058298391b94cc30d8a0d0281aafd1497e6691ec0a194610b6bee73908c9f3e536ee7801cae7b0eeafd1bd7691b46536c9968983dcceb9f3b957c5489dc70901973ceb0cf8ca38526ee6235a8978b8e150e2b88b7b108436f85075eab5265ca7bdcc2b2e0445f659b94c0f8fc75f887f341f2a89954328c5864ee5805ef9691046f5d1277912c96f62dc514f724860d5131a30add3018135584bdf3f8dede9517e2f757d80bc95ca9ecc54d041e396e4bc47e2cd70328b15a17d60f6e2f5c8f7686191fb1db45ebcdce711e773098cae55532bd4997a7c5c9981b43f45361733930d91859ba79ea32b0f37fd6eddc96f87be29ff6abd1faea3f19139c4d582fd70833ac20d872c75a442441e43db8b8d2fae1097600f9b4214af65f0baf8cb34ba23634fcb78c8b5053d7cbc1bc40c4a4ccce434a8dd9c1a3aed1b5412d9a28087c1eef1045d2390fef160e85390249f81b6ba6b0e34954b48507c7f72a37eb7e4789ebc42e007aed2bf73fb13fa5487bc3fb1aa9438c1b095f86d86926c2fd509e4d83b9ff39e25d2a785fa249c88322872bcd716a1858137b8f8a09e4544eb9616149cc147d30a898fb40cb1bc12ce597d846b3fe0fb56e346849dee4b8a41ea59ebc8fcab6ece428fb546af27b9d15874bdd10bed0f390a5f9a75a040a72e4a74e78c9eb2a5a38005ac2e2bb261cb7a556b08761073d33a84a968f639795579a360224b21997d1f069fd7ddffbb3691e9deb385df6afa8f9f5f6a1d5ebddc141faf24b36f094da7f39ddbd121e7268bd65b67d8d729c46aadc5d74931d33e21b39efa40cf563c3119ca04eecfd8bf92ba4235959d6ccdd7338c18546ad83a2219ffc5ffca657dfc1888871f53ecfd2e7654a8d59900be5dc9f88cb507ef9b7624317c9255176192436f0f3af7a2e97b8368b50a49f7478da7e023c12dae2f6f037fb5a14f03f4775b038229473695ce5ea19fad558ecb6aff7a69230e53d09a84ab88b1263aa4a2f2d64bfd66cace5104e3710c1560e51d28100440083800c7299c26e3d55c62056baf0cbe0115ca488b12ca9e2ff80dff6f353a1c0503effaffd2ebb50bdb02af9f64fb5c8d1e35ad6c60d064d6373afa800d82cda6e7239823d4ec67d48c47e1a176c2739a0d032f4fe4489f2fcb92df6c32e311e8558a341d5bf70f778a44c3a2ab24a502a15aec5ba2f9b7606dfa2dd2438eea71bd4932cd8c4fccb21301102b41cff3eff7f7d842b16fd59b1c8a2d5209337fda88971081b610119e4e05ebda861440b1522c685a58ea5a2e7f525ebd9781e8dd882abb6a846d122ddaf648ee8033b3e5cd2fe6297e7dfa369a5c44e3da7625980f2b1e6d0af48fb4f4617adeea8e63879600004c3f4fc172e6c09d107968b82d4bc4a339407374aa3b438c932234a0c83a60738400a2d86966842afe1c3d51f2ecbbe06d27e412612a718da36be6e63ed36d6d7f6b02dca062ce59243d4336e6df088f89255d8bc39479caafc6acaa87783f985604e0c9670d96a77c1727031ac8577816dc82fb44d34b987b9a5e9573b3dfefaf25d217734ac4d97d1ba15e1e582afe5c8dfe1b40dd8cf0bdaa117ea5a85f231171021f37bca2a06f956f2ea1bc0c07876764ceded8b48dcb2dea656701147d7bf99ef74b52b8b3b1a1cf5623ef83dff75499b9a06aa06c18b28641b19d1ae4fda01a0a7efbb229c4f6e4ae8c2fef49d5ef6e486fb49664cd6ae9ca02853d916305e08d8063422b735baf9643130c3441c8c194e8d479140c1fa4505b16b7480bee4abd6bf1b8eb6cc6e3624ef7a973f349a1f1dc6dddef2e8035849898bb0a81fcc539913c8561081c9ef54a0f7de208f81c39175505b12f702aaa01a5201d630a3172eca8a1a1dab406a4e2983f69247ce8b625d912f24688d53828e510d29ad16aa2e342c2aaddb5a663a963aedfb28adaede285ea543e68683e7c4405876f3ce2c4528bc80d0e3077b865c9408307fde8e6ab8fae44273209092bb4eb5bfbc006948a61a820b0ae3fc2caf14521d962f9067190266b5ed646c1f78edbdf82e10bfa179a8882bf97acf80efadfd8613d7cdc1d800bdd7b94fac49683f821fb45b50954e9d1e87e00eac452a9a5bf5783277edb965f1cb187ac50e86f8b569d2c12f0043b3326bb9df881d885c211dc69007898524aa77ba07ad92f7eddc2e27133e88c28a2b1b9a4a5dd93b3a71815768c7a3e02b7644b8670268b5a0fba1148b99f2fe7e2162a983857e5d648595dd67edbae303544c41f54dedf530bc369d745521ca9f4111e83ead814e4c57dfa7ef3dbdd54d07616c49bd54706c11e3ac5678b40b0ef1e8181af5f0d74d38eacccb8a658cc4667d3aaeb0f2095619687e8c74ff432271a6b4e3523c1732cf2288ecb5b77c60a23bb1f43b3869ad0e457bb7a7c5136699376f034552a228d285d710c5cd7a49b462cc11652a05e2de159734ca488b0207b62dab39c80a29b7f99600493d219679d16587641c5672711b8f67a62d1944a00ce80ddd0406c4f72bb26d5b35ab4a74be931dfba1ee36abfb1e6638f644a7c1fae505f06f90eb8b3b250b9939d129d702ca37eb862c1551a1df6040ced702e2acffb2cb349878e5172d2dd926398fbfe35dee8836ead2e5437a893dadd671ba20bb771a3d688c70f0d1bc921bfea99129144187360dfff577acfb8950862c5d882b5c9e5d4b4e8ca1656fe7ee056621e8ebc2bb0f42d923688de3fa55f0a7e211bda4fdd97600e8613709eed1907347da330766e08d255c7d39321be9e3a70e7d95172ed27257a837f32996d023b8aa80bef2eb0a92fa9ec5530355ed8afa19986a4897c1bf0e135ef4259e82426f457ad7bd3ef416bfe874fa0048ef58a3a184b562b31330a990074a1fcfbf2f7ffa8e70552c55f2c3bc263b720fd5dd33756e39639eeb4fecbdbfd2eb2810f7027f7a49924e59ae130a3f9775a1e7d7f0b1b810767d1520880ac9d3574efa34c9cefa26c4c0522c4ee1b7d85c2e1dda6cfa78c3e60b11920befacd48113c2d181e875286809112a44ba97040f4555a62ac52b73721ac3717e814ddf749f697bfd7116f02dc453fe47f0a02dfe61e56c27c9ca6b70411874c76e01cf7b9edd5845f323070b92f20a323785d68c2bb971d1842f18e089b52de405046c76f0f037eb087ac7536c9f3e843b558d6bdda1de15a1c29bb3e3c357cbe56b91de69e2b1f07754471a3ba117d97691ea6825e2a5b416f95e29fa5627e6e27060afb7c550fade5279f19b1dc13fee0bbff2e5e226c9b66992b6a7ce7dc44994370140891f9295427f9e8da4cd2d0255f39d33b313feb9ac26825a5982660ca140e0b2c37e51c2173f7593d48891a399317a84683ed5d5b60703c9c716237a94253492d9674e2a8e96be87fa483d070d120c78586a937bce7a19d79afdb67fe0a39d49177f7e2c8f635ef847d8c31f60ae2042766c5da970c8bc615dcce35e1dce07259b752c0a27b8f4a62bea590be88b0d29754e1365ae9a2148fa7f7a23084269a7296302fb9970a01796b4235bb1fff5c6761d957433d765b1b7edcb26a0c4745ae208fffe8c8556c3259c7b33734e8b335a89940235f944f3b1a1003aad9bd93ab655ec8f4901c40a887b83631ba37b999b6c5e78746aa7c30e746976e13456c2099bd049755c7dc03ac91c8a9c988deeca84392a008a17604cb2e18bf67b9220762358799069657771196bda06a188d00b661fd67879f388c47d1899eeb90039b3e73863460c3458bb8bd24ab6073509700cdcbc64f134a9d6e606fddaf83b1c6f5ae90ec460c97285ad08f516554485210730363c06e07418cfe28df2b8fd1a77403a58cf35890e8dacad9b377afc24ff086fa5cd0dc4063837d905df6a9ed0fbf637888e16a433733f3a12271887be4d53282e6e0b8b63891435703b269e5f42738eab64619bb9b0fede6b549f265ac70ad2c969fdc66e38ec0b7c03efed688c9f7db80a418b37fee4d986113ac793ab88da1ca72a8a7a376c8087cf92946cd08675d93fc8d6460292af", 0xfa1, 0xfffffffffffffff8) keyctl$setperm(0x5, r6, 0x20) getpeername$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 05:58:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c, 0x15, 0x5, 0x0, 0x0, {0x1}, [@typed={0x8, 0x1, @fd}]}, 0x1c}}, 0x0) 05:58:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:22 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000700)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, 0x0) 05:58:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0xffffffffffffff99) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r2, 0x8, 0x0) 05:58:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], [], []]}, 0x678) 05:58:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xb, 0xf, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) getsockname(r0, &(0x7f0000000240)=@caif=@dbg, &(0x7f0000000140)=0x80) kexec_load(0x2, 0x1, &(0x7f0000000580)=[{&(0x7f0000000500)="292f7cddbfd019f26e25621dd03c70c75dfd211cf978de3579d50f4012e3477a75a46d9903b50e92165a38d382f5b53b05de9732b2f101c7071d3e6eb1fe311b54725f4b908e9812d56074a3605b69c4a4", 0x51, 0x80, 0x6c}], 0x280001) 05:58:22 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$sndseq(r0, &(0x7f00000022c0)=[{0x2c3, 0x0, 0xd6ba, 0x2e, @time={0x77359400}, {0x3, 0x1}, {0x6, 0x5}, @ext={0x1000, &(0x7f00000002c0)="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"}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect={{0x81, 0x6}}}], 0x60) 05:58:22 executing program 2: 05:58:22 executing program 4: 05:58:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x404100000001, 0x4) r1 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r1, 0x7fff, &(0x7f0000000400)="a8b9854201882b07774d066c19477e6c8bf814615b884af2fb5ef76e7626bd78cc3cae2ae8307aa21dea7cc5b907c4c95a498eb3984a2750af56d8a054b36c76f2456b97164385671ff0da4e69efffe9d9a3e6d437011a546dc8765517c00095da4d02e7fdb6b39f17fe4e9a4ca1ae792a5e38ddb84bbeafcab22a4a66c557e6455a23dc9f16b883cb83d2") r2 = dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000180)={0x7fff, {{0xa, 0x4e20, 0x5, @remote, 0x1f}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 05:58:23 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'system.'}, 0x0, 0x0) 05:58:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x40044591) 05:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:23 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020a040007000000ebff0f364f3f220005001a000595a9d77fd17e1d2ca7c6100000000000000002000000d2d1c09f6c5c3e8c865fc690a500575e641d6fc43c00ad1ea413edf7d6a16c392bdc53beb7777d12f2a83e7999967b443fa7b59f7b7e35c1b46edc16757ea1a0d43c5e89498fb2049bc93c61a433eec8d9532a2200424f33b2edb063a2d3485442a28ea8006f6db30a05e8a1b9237ef6fd26ed15956bfd8b85e60365e0d90749727da8f8e3d893333f6570bece176e7dbb506e727cf7895fd248a2a1186e20ad1a2d01d706ae8f8c74b3179d3f"], 0xd8}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) 05:58:23 executing program 1: 05:58:23 executing program 5: 05:58:23 executing program 4: 05:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:23 executing program 4: 05:58:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:24 executing program 2: 05:58:24 executing program 1: 05:58:24 executing program 5: 05:58:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:24 executing program 4: 05:58:24 executing program 5: 05:58:24 executing program 4: 05:58:24 executing program 2: 05:58:24 executing program 1: 05:58:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:24 executing program 2: 05:58:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:24 executing program 4: 05:58:24 executing program 5: 05:58:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:24 executing program 1: 05:58:24 executing program 2: 05:58:25 executing program 5: 05:58:25 executing program 4: 05:58:25 executing program 1: 05:58:25 executing program 2: 05:58:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:25 executing program 4: 05:58:25 executing program 1: 05:58:25 executing program 5: 05:58:25 executing program 2: 05:58:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:25 executing program 4: 05:58:26 executing program 2: 05:58:26 executing program 1: 05:58:26 executing program 5: 05:58:26 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:26 executing program 4: 05:58:26 executing program 2: 05:58:26 executing program 5: 05:58:26 executing program 2: 05:58:26 executing program 1: 05:58:26 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:26 executing program 4: 05:58:26 executing program 2: 05:58:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(0x0, &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0x4b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:26 executing program 5: 05:58:26 executing program 1: 05:58:27 executing program 1: 05:58:27 executing program 5: 05:58:27 executing program 2: 05:58:27 executing program 4: 05:58:27 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:27 executing program 1: 05:58:27 executing program 2: 05:58:27 executing program 5: 05:58:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', 0x0, &(0x7f0000000280)=""/75, 0x4b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:27 executing program 4: 05:58:27 executing program 3: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:27 executing program 2: 05:58:27 executing program 5: 05:58:27 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') dup3(r0, r1, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='./file0\x00', 0x0, 0x1080, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 05:58:27 executing program 3: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:27 executing program 1: 05:58:27 executing program 2: 05:58:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:27 executing program 5: 05:58:28 executing program 1: 05:58:28 executing program 3: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:28 executing program 2: 05:58:28 executing program 5: 05:58:28 executing program 1: 05:58:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:28 executing program 4: 05:58:28 executing program 2: 05:58:28 executing program 5: 05:58:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:28 executing program 1: 05:58:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, 0x0) 05:58:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x2, 0x6, "1f0a46bf39b402fabd7bf4209988778c", "c227c2360dfef652b55a61f01a469891ea9796322bd312ea62f6fe44481430eb4fa2dadc"}, 0x39, 0x0) 05:58:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:29 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000290007031dfffd946f610500000000000500000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 05:58:29 executing program 4: 05:58:29 executing program 2: 05:58:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 05:58:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000200)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/ptmx\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r1, 0x1, r2) getegid() write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 05:58:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:29 executing program 2: r0 = msgget(0xffffffffffffffff, 0x80) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000001240)=""/4096) 05:58:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x1000102) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 05:58:30 executing program 4: creat(&(0x7f00000001c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x2, 0x0, "1f0a46bf39b402fabd7bf4209988778c", "c227c2360dfef652b55a61f01a469891ea9796322bd312ea62f6fe44481430eb4fa2dadc"}, 0x39, 0x0) 05:58:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={r3, @loopback, @multicast2}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr=0x27177c06, @empty, 0x1, 0x3, [@dev, @rand_addr, @multicast1]}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x8, 0x4, 0x9}, 0x10) 05:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="afbd001b79", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000080)=""/132, 0x20000104}], 0x1}, 0x0) 05:58:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, 0x0, 0xffffffffffffff1b, 0x0, 0x0) 05:58:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 388.293037] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:58:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000000)) 05:58:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:32 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, 0x0) 05:58:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7a, 0x0, [0x4b564d01, 0x35fd]}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) 05:58:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, 0x0, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, 0x0, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, 0x0, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7a, 0x0, [0x4b564d01, 0x35fd]}) 05:58:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) 05:58:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000580)={0x298, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:33 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r0, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, 0x0, 0x0) 05:58:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$notify(r0, 0x402, 0x0) 05:58:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x298, 0x0, 0x0, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x4, 0x96, 0x0, 0x2, {0x0, 0x81, 0x80000000, 0x5, 0x100000001, 0x5730, 0x100, 0x40, 0x6, 0x1, 0x4, 0x0, r2, 0x6, 0x9}}, {0x1, 0x1, 0x5, 0x0, 'eth1#'}}]}, 0x298) 05:58:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, 0xffffffffffffffff, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$notify(r0, 0x402, 0x0) 05:58:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$notify(r0, 0x402, 0x0) 05:58:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x1f8, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}, {{0x1, 0x3, 0x1ff, 0x6, 0x172, 0x7fff, {0x5, 0x7fff, 0x8, 0x2, 0x1, 0x5, 0x80000000, 0x8c2, 0x1, 0x80000001, 0x2, 0x0, r2, 0x6, 0x1}}, {0x3, 0xa493, 0xa, 0x6, '/dev/fuse\x00'}}]}, 0x1f8) 05:58:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039", 0x24) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148f", 0x2a) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:58:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x150, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r2, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}, {{0x6, 0x1, 0x3, 0x8, 0x4, 0xf6e, {0x6, 0x2, 0x8, 0xffff, 0xb70, 0x7a, 0x401, 0x3, 0x5, 0x0, 0x8, r1, r2}}, {0x5, 0x4, 0x1, 0x7, '+'}}]}, 0x150) 05:58:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207", 0x2d) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:58:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794d", 0x2f) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:58:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:58:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) 05:58:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:39 executing program 2: fcntl$notify(0xffffffffffffffff, 0x402, 0x80000018) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 05:58:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, 0x0, &(0x7f00000000c0)) 05:58:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:58:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x10, 0x0, 0x4}, 0x10) 05:58:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, 0x0, &(0x7f00000000c0)) 05:58:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:58:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, 0x0, &(0x7f00000000c0)) 05:58:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x10, 0x0, 0x4}, 0x10) 05:58:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), 0x0) 05:58:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, 0x0, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), 0x0) 05:58:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x10, 0x0, 0x4}, 0x10) 05:58:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), 0x0) 05:58:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:42 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @multicast1}, @ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x4000000000017}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 05:58:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:42 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 399.301703] ptrace attach of "/root/syz-executor3"[14654] was attempted by "/root/syz-executor3"[14655] 05:58:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x85800000, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:42 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:42 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='./file0\x00', 0x0, 0x1080, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 05:58:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x0) 05:58:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fcntl$notify(r0, 0x402, 0x0) 05:58:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x100000001, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:43 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) getpid() ptrace$peekuser(0x3, 0x0, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) write$cgroup_type(r0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) io_setup(0x0, 0x0) 05:58:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fcntl$notify(r0, 0x402, 0x0) 05:58:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:43 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fcntl$notify(r0, 0x402, 0x0) 05:58:44 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) 05:58:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r1 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r1, 0x10099b7) sendfile(r0, r1, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) 05:58:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x800, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000018) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 05:58:44 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f00000000c0), 0x2c3) 05:58:44 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6001209c00050600fe80080000000000000000000000000000001c00000000000000ffff000000008100907800000000"], 0x0) 05:58:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 402.051655] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:58:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:45 executing program 4: r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r0, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r1 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r1, 0x10099b7) sendfile(0xffffffffffffffff, r1, 0x0, 0x88000fbfffffc) connect$unix(r0, &(0x7f0000000100)=@abs, 0x6e) 05:58:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 05:58:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x2cb, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:45 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) r2 = dup2(r1, r0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000140)) 05:58:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:45 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000180)="d8", 0x1}], 0x1, 0x0) 05:58:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) dup2(r1, r0) 05:58:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:46 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, 0x0) close(r0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$int_out(r1, 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) 05:58:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da4", 0x10}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) 05:58:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da4", 0x10}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:46 executing program 3: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, 0x0) 05:58:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da4", 0x10}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) 05:58:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213", 0x18}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x6) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) 05:58:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84", 0x1c}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x5, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:47 executing program 3: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, 0x0) 05:58:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:48 executing program 2: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) poll(0x0, 0x0, 0x8001) 05:58:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6d", 0x1e}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dca", 0x1f}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:58:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:48 executing program 3: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, 0x0) 05:58:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) r2 = open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x42000, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r1, 0x0) dup2(r2, r1) [ 406.422885] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 05:58:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da43adffa44c2a20213d7550c84cf6dcae6", 0x20}], 0x1}, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:50 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 05:58:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:50 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@remote, @remote, @dev, 0x3, 0x0, 0x0, 0xfe}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:58:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xc) [ 406.988590] ptrace attach of "/root/syz-executor2"[15031] was attempted by "/root/syz-executor2"[15032] 05:58:50 executing program 2: msgctl$IPC_STAT(0x0, 0xd, &(0x7f0000000100)=""/85) 05:58:50 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) gettid() syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x40, 0x4, 0x5, 0xc390, 0x0, 0xfffffffffffffffd, 0x88209, 0x0, 0x0, 0x5, 0x0, 0x7d, 0x0, 0xe2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5, 0x4, 0x0, 0x3ff, 0xffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x0, 0xffffffffffffffe0, 0x6, @perf_bp={0x0, 0xa}, 0x0, 0x4, 0x0, 0x9, 0x0, 0xa83}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x1, 0x2) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x20}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:58:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x67, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:58:50 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='#[vboxnet0vmnet1security\x00', 0x100000202) pwritev(r0, &(0x7f0000000480)=[{&(0x7f00000006c0)="f2", 0x1}], 0x1, 0x0) close(r0) 05:58:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:58:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:50 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pread64(r0, 0x0, 0x0, 0x0) 05:58:50 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x1fe) 05:58:51 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) 05:58:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x45, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:58:51 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) 05:58:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x4d, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:58:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:52 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x46000, 0x0) 05:58:52 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000002c0)=0x4) write$tun(r0, &(0x7f00000001c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 05:58:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c1f023c126285719070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xa, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 05:58:52 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x0) 05:58:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x200, 0x800}) 05:58:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:52 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) [ 409.612693] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 [ 409.851141] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)) getdents64(r1, &(0x7f0000001040)=""/144, 0x90) 05:58:53 executing program 3: get_thread_area(0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) r1 = creat(&(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, 0x0) 05:58:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:53 executing program 1: msgctl$IPC_STAT(0x0, 0xf, 0x0) 05:58:53 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 05:58:53 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="6418e2cd", 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 05:58:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:54 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:54 executing program 3: lstat(0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 05:58:54 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000005c0), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) 05:58:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:54 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:54 executing program 2: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 05:58:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="030000000000000008001b0000000000"], 0x1}}, 0x0) 05:58:54 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) request_key(0x0, 0x0, &(0x7f0000000280)='}]\x00', 0xffffffffffffffff) add_key(&(0x7f00000002c0)='blacklist\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x0, &(0x7f00000005c0)}) lsetxattr$security_smack_transmute(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000740)='user\x00', 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000001900), 0x0, 0xfffffffffffffffa) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) write$P9_RSETATTR(r2, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000001f40)={0x1, &(0x7f0000001f00)=[{}]}, 0x10) 05:58:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:55 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 412.219132] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 05:58:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:55 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) [ 412.664063] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 [ 412.905138] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 05:58:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:56 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0x1, 0x18042, 0x0) 05:58:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 413.267627] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:56 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 413.884550] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x10) 05:58:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:57 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:57 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='\t'], 0x1) 05:58:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:57 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x0, r1, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000600)=@newlink={0x3c, 0x10, 0x511, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x3c}}, 0x0) [ 414.878474] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 05:58:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:58 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 415.149754] netlink: 'syz-executor3': attribute type 9 has an invalid length. 05:58:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00', {}, 0x0, [], [], [0x3]}, 0x45c) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000340)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000400)="2cb0d142e2a39548680b06ab8bfe646a6e8a4b28179178999b147c09db77bf3e90f1ed3d291538ee946b4c19e8e8dde94222820ab4b52c151a7930ef6d5cbaac1b4a7721d780f6f4b3843f306017aebe8fc5c134cfa17a8a70a2dd877e98e994eac0c24baa167ef91baffbeb824fd7deb443cf7c01c347e35af5d161e3669dd3b5bbdb4c2f82d5b214e2dd9f17a4f666a247f2ab5ac723ebd9fe2be307e353fcbdac98d95b45ccfa6a109bb2") pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2000000, &(0x7f0000000600)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = getpgid(0x0) getpgrp(r4) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f00000005c0)={@multicast1, @local, @dev={0xac, 0x14, 0x14, 0x1b}}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) clone(0x0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)) 05:58:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:58:58 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1, 0x0, 0x0, 0x7fffffff, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:58:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) [ 415.728755] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 415.869417] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:58:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:58:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:58:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6f"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 416.225533] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 416.369172] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:58:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6f"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:00 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x1, 0x2) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x20}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:59:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:59:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1, 0x0, 0x0, 0x0, 0x4}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:59:00 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6f"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:59:00 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) [ 417.235512] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:59:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 417.533749] tty_tiocsserial: 'syz-executor3' is using deprecated serial flags (with no effect): 00000100 05:59:00 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000001c0)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x2, 0x4fb) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) 05:59:01 executing program 3: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, 0x0, 0x0, r0) 05:59:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[]}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1}}, {0x5, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:59:01 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x3) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) socket$unix(0x1, 0x2, 0x0) fsync(0xffffffffffffffff) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) close(r0) [ 418.198632] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:59:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff9"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:01 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) syncfs(0xffffffffffffffff) 05:59:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000080), &(0x7f0000001780)=0x10) 05:59:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1}}, {0x0, 0x0, 0x8, 0x5, 'rootmode'}}]}, 0xb0) 05:59:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:02 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:02 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) syncfs(0xffffffffffffffff) 05:59:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:02 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) lgetxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000280)=""/75, 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0xb0, 0x0, 0x4, [{{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x1}}, {0x0, 0x0, 0x8, 0x0, 'rootmode'}}]}, 0xb0) 05:59:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:03 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:03 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) syncfs(0xffffffffffffffff) 05:59:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:03 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:03 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) accept4$unix(r1, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80000) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 05:59:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:04 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:59:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:04 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:05 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @dev}, @remote, @mcast1, 0x0, 0x0, 0x0, 0x106}) add_key$user(0x0, 0x0, &(0x7f0000000080)="5b9cd2a284f7a1b6405e5ff517d3626ad06915e517adeb62acba5447579965c6a7295bb366827546587ea8bd41e186acb91c2039962f63c29c", 0x39, 0xfffffffffffffff9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:59:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:05 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:05 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:05 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x0, 0x8001) 05:59:05 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:05 executing program 0: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:05 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:59:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:06 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) [ 423.492240] tty_tiocsserial: 'syz-executor5' is using deprecated serial flags (with no effect): 00000100 05:59:06 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x0, 0x8001) 05:59:06 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000100)) 05:59:06 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000840)={0x8, "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", 0x1000}, 0x1006) setgroups(0x252, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) sendfile(r1, r0, 0x0, 0x71c) 05:59:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000140)={0x70, 0x120, 0xfa00, {0x0, {0x0, 0x0, "3a124098a3661eaf84d234ce683b0fa392192214ae9fa7f62fcd73c425b0c8d7fb19a5ab0bf4fe24cc330b8650fdb7f13d4909e931a5f0022b2b3be34b99f52caba79730b118643341a93ef828e9fd1e09c214e35b7f7c0b0ea6e13c6edc0915042ba4cea84a411d23f0f5d83f5746f45bcabe0950358093a4ddcb9aa6d0a9300e4aad8f752f730efaa2fea6e9080322c54179678a42f9949666b461ee0fd426cde76086ea249ed2d0f2947f9ac2679971104f663abc643c6b969c2f9870c4822a0130982f097ed6ed8628773a845eac43edcc9ac7d5c2736cf21909368ea31587daa6fbc56e71ff6872d005aab84d8aa69c83ce5d2c739b3f98348562fb7df5"}}}, 0x128) 05:59:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:07 executing program 2: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'user.'}, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') 05:59:07 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000180)={0x3e, @rand_addr=0x9, 0x4e21, 0x4, 'lc\x00', 0x4}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0), 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x101, 0x400}, {0x4, 0x9, 0x3}, {0x4, 0xe67, 0x8, 0x3}, {0x80, 0x873a, 0xffffffffffffffff, 0x3ff}]}) r3 = socket$unix(0x1, 0x5, 0x0) dup2(r3, r2) connect$unix(r3, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000100)="aa", 0x1) 05:59:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:07 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) 05:59:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffcf}}, &(0x7f0000000180)='syzkaller\x00'}, 0x48) 05:59:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) 05:59:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x200000000401, 0xfd9f) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff4b) 05:59:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, 0x0) 05:59:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xff000000, 0xffffffcf}}, 0x0}, 0x48) 05:59:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) [ 425.130782] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:59:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) 05:59:08 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x25f) socket$unix(0x1, 0x2, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)='U', 0x1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) 05:59:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x6b, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000000000000080000000000000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00b6fc663019d9476a25"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x6b, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 05:59:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) 05:59:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c1f023c126285719070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) 05:59:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:09 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) r0 = socket$inet(0x2, 0x1, 0x6) r1 = dup(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair(0x0, 0x4, 0x0, &(0x7f0000000140)) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x20003) r2 = accept4$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @dev}, &(0x7f00000004c0)=0xfe04, 0x800) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0x37a) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f0000000240)}, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000240)="f0543ea004b5630695000000000000000000", 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000005c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x4, 0x9, 0x3, 0x0, 0x0, 0xfffffffffffff8b0, 0x4, 0x5, 0xfff, 0x3, 0x3, 0x303d, 0x7, 0x2, 0x0, 0xffffffff, 0x1, 0xffff, 0x1, 0x477, 0x80000000, 0x7, 0xfffffffffffffff7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r3, &(0x7f0000000500)=0x1, 0x80000083) 05:59:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:09 executing program 5: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x0) 05:59:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) 05:59:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x1b, 0x0, &(0x7f0000000180)="51264626889684165ad21e03018029000000000000000000000000", 0x0, 0x1e41}, 0x28) 05:59:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:10 executing program 5: r0 = perf_event_open(&(0x7f0000001b00)={0x2, 0x70, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x12c, 0x10000000000]}, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 05:59:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x200, 0x8000}) 05:59:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:10 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) 05:59:10 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0xffffff93, 0x0, 0xffffff80, 0x0, @time, {}, {}, @result}], 0x30) 05:59:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:11 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x5d5079649a141865, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000200), 0xa) 05:59:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380), 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:11 executing program 5: 05:59:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:11 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:11 executing program 5: 05:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x11, &(0x7f0000000340)="7ad686da093e0000e4ff00000000dee31d"}) 05:59:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:12 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) epoll_create1(0x0) write$P9_RMKNOD(r2, 0x0, 0x0) 05:59:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x5, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000006080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}], 0x18}, {0x0, 0x0, 0x0}], 0x2, 0x0) 05:59:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c12008571") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ffb"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:12 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:12 executing program 1: 05:59:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:12 executing program 1: 05:59:13 executing program 5: 05:59:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:13 executing program 1: 05:59:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:13 executing program 5: 05:59:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c1200857190") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:13 executing program 1: 05:59:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:13 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:13 executing program 5: 05:59:13 executing program 1: 05:59:13 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, 0x0, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:14 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:14 executing program 5: 05:59:14 executing program 1: 05:59:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:14 executing program 5: 05:59:14 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:14 executing program 1: 05:59:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(0x0, 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:14 executing program 5: 05:59:14 executing program 1: 05:59:14 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:14 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:14 executing program 1: 05:59:15 executing program 5: 05:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{}], 0x1, 0x1ff) close(0xffffffffffffffff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x600, 0x0) 05:59:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:15 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:15 executing program 1: 05:59:15 executing program 5: 05:59:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:15 executing program 1: 05:59:15 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:15 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:15 executing program 5: 05:59:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:15 executing program 1: 05:59:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:16 executing program 1: 05:59:16 executing program 5: 05:59:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:16 executing program 1: 05:59:16 executing program 5: 05:59:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) 05:59:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:16 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:16 executing program 1: 05:59:16 executing program 5: 05:59:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) 05:59:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:17 executing program 1: 05:59:17 executing program 5: 05:59:17 executing program 5: 05:59:17 executing program 1: 05:59:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) 05:59:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(0xffffffffffffffff, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:17 executing program 1: 05:59:17 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, 0xffffffffffffffff, 0x0, 0x88000fbfffffc) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:17 executing program 1: 05:59:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:17 executing program 5: 05:59:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:18 executing program 1: 05:59:18 executing program 5: 05:59:18 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:18 executing program 5: 05:59:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:18 executing program 1: 05:59:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs, 0x6e) 05:59:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x4e20, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:18 executing program 5: 05:59:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, 0x6e) 05:59:18 executing program 1: 05:59:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:19 executing program 5: 05:59:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:19 executing program 1: 05:59:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:19 executing program 5: 05:59:19 executing program 1: 05:59:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x4c080) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7d6a591eedaef62b}, 0x320) r2 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fbfffffc) connect$unix(r1, 0x0, 0x0) 05:59:19 executing program 1: 05:59:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:19 executing program 5: 05:59:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81, 0x7fff, 0x40}) 05:59:19 executing program 1: 05:59:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7fff, 0x40}) 05:59:20 executing program 5: 05:59:20 executing program 1: 05:59:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x40}) 05:59:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:20 executing program 1: 05:59:20 executing program 5: 05:59:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x164, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) 05:59:20 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:20 executing program 4: 05:59:21 executing program 5: 05:59:21 executing program 1: 05:59:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @initdev}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @broadcast}, 0x164}) 05:59:21 executing program 4: 05:59:21 executing program 5: 05:59:21 executing program 1: 05:59:21 executing program 4: 05:59:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:21 executing program 3: 05:59:21 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:21 executing program 5: 05:59:21 executing program 1: 05:59:21 executing program 4: 05:59:21 executing program 3: 05:59:21 executing program 5: 05:59:22 executing program 1: 05:59:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:22 executing program 4: 05:59:22 executing program 3: 05:59:22 executing program 4: 05:59:22 executing program 1: 05:59:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:22 executing program 5: 05:59:22 executing program 1: 05:59:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:22 executing program 4: 05:59:22 executing program 3: 05:59:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000788000), 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 05:59:22 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5441, 0x0) dup2(r0, r1) 05:59:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x11, &(0x7f0000000340)="7ad669da093e6b1e3f6f7798f965dee31d"}) 05:59:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @loopback, @multicast2}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty, 0x1}, 0x10) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, 0x0, 0x0) 05:59:23 executing program 3: 05:59:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:23 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x335}}], 0x73, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 05:59:23 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5441, 0x0) dup2(r0, r1) 05:59:23 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) getegid() setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x9, @remote}}, 0x0, 0x0, 0x0, "960622fcf15932064ccbd168c6a88b6b8f59a5fa67c2c26c265a19a562ca543926be646850e69e144245f0ad930977fdb32dbabc57729fe91a718720ec68b0cd9486834e9df79a1a8f35e55bd7f219e0"}, 0xd8) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x16, @loopback, 0x0, 0x0, 'sh\x00', 0x0, 0x8, 0x7a}, {@loopback}}, 0x44) 05:59:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 05:59:23 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000200)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/ptmx\x00', 0xfffffffffffffffc) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') keyctl$negate(0xd, r1, 0x1, r2) getegid() write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 05:59:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:23 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) epoll_create1(0x0) write$P9_RMKNOD(r2, 0x0, 0x0) 05:59:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000001700)="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", 0x67d, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="d763ec98de31f5dc47bd7ae5eeceba2e977e432f103b988c19d71150515b1e85734b186237ec9b9430fec0a3117d1440a9c30c12723d46fc4454123028fb5730ac9eb53022e5108d5e6f8fa861b991fcb0123281d4150b0506e8f00c4590b571e43dc126ea669e8e4e2c88f4b8cf4b4540dd7d1bb2981a7fb052afed9c842be23349319c9ef8d893fd656f968ea7e389dc9d942f7a88e123a00f0a215c4281e732e613eeab652fcd162b62bc2d6707625c5d46cefdefc69190f2c3cc9560781c21591b8df9c0887f4c6efd4bc0dba9d990422bc99da74205708160bfaab1b0b1ec814cfec3af29c8f6506c540115c1871c255da471697e83f03269ec8abb0867a224d1045da148a79669e03208672919fc140aa8c4ff0d3e642be95dcec333a9a2fc051f192ded8fcb9b911f77809a7c", 0x130, 0x0, 0x0, 0x0) 05:59:23 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) 05:59:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)) 05:59:23 executing program 4: clone(0x3002001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) get_robust_list(0x0, 0x0, &(0x7f0000000700)) ptrace$setregs(0xd, r0, 0x3, &(0x7f00000005c0)="2bfbf94b783d22be010052591970") ptrace$cont(0x7, r0, 0x0, 0x0) 05:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) 05:59:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:24 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@sha1={0x1, "c9304205b29e040b66e38bba056e9176f109dc56"}, 0x15, 0x3) connect$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e) socket$unix(0x1, 0x2, 0x0) fsync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x32, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'sed\x00', 0xa, 0x6, 0x7f}, {@empty, 0x4e23, 0x10003, 0x101, 0x60, 0x8}}, 0x44) 05:59:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="afbd1bfe0521a5080ef0dc57c5f2d61e29657010e883a4ee39b3fa6ff1abe4f305483965405fe8b6b8e10917e7d2c1d833247dc8caa7c9a85887b4895c3c8b0b85de803be522685b773155000000000000f95057c4c331eb8a651296", 0x5c) 05:59:24 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x420b, r1, 0x8, 0x20000000) 05:59:24 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 441.348586] ptrace attach of "/root/syz-executor4"[12183] was attempted by "/root/syz-executor4"[16673] 05:59:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$void(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) futimesat(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) sync_file_range(r1, 0x0, 0x0, 0x0) creat(&(0x7f0000005640)='./file0\x00', 0x40) 05:59:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000140)='./file0/bus\x00') 05:59:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept$inet(0xffffffffffffff9c, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) modify_ldt$write(0x1, 0x0, 0x0) write$P9_RLINK(r2, 0x0, 0x0) 05:59:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)) 05:59:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000080)=""/85, &(0x7f0000000000)=0x55) 05:59:24 executing program 4: sched_setaffinity(0x0, 0xffffffb4, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000200)={0x77359400}) 05:59:25 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='0'], 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$IPC_RMID(r0, 0x0) 05:59:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 05:59:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000200)={0x7a, 0x0, [0x4b564d01]}) 05:59:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x1fe) 05:59:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:59:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:59:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 05:59:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz'}, &(0x7f00000005c0), 0x0, 0xfffffffffffffffd) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) dup2(r1, r0) 05:59:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000780)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aSJ\xb9\xe1}Q\xf8\xb4 kt\x06\xf6%\x15\x92zv\xb3\xf8h>\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91{Pq\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\x00\x00b\x9d\xde\x1d.1\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\x1cZ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\x04\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd41\xfb3eu\xbd\r\xfe\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xce\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x06\x00\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xbfL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xc9\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xeb\xa7\x85\xd1&=\\e\x04\xa4go\xc1\xba\xa9\x0f\xb0k\x8b\xddp\xf5\xcbT\xa3\xe4\xd5\x87\xb5\x12\x92\x1b\x95S\x9c\x89\xe6\xc1&\xdbi\xb9\xc8l\xb0|6>x\xbc\x1a89B\x97yL\xc5{\xa7\x1b\xe0+NY{j \xf8\xb8; N\xb9C%\xb2\x8bK\x8f\xd3q\xf0\xde[a\xdf\x00\xf9\x17\xefhW\x02\xbb\x99\xb1\xbc\xe7i+\x8bAD\xec\nMax7\xab\xd9\x00c\xa7\xa6X\x8321>\x16\xe2X\x04]\\\x03\x9e\xe4\xc3\xb0\xc3\a\x03;\x9a\xa5\xafv\xa8\x13\xbb\xe4\x99\xe1\xbc\x1d[\xba\xe8\xc6a\x93l@\x8e\xb7-*\xdd\x84n3\xb1$M\xe4:\xf4n\x88\xe9\xf5\xc6\x9a\xe2!\n\xbf)u\x1b\x0f\x1d\x95hXw\xaeN!\x95\xd1\xd0W\x10U\xdb\xcc]c\xa7a\xcf(\x84\'\xcc\xacl\x85\xe5z&\x8f\x85R\x90\xc0\xa0g\xaf\x93\x9c;C\xe4\xe1[\x94\xe8\xae\x7f\x83\x89]\rN') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 05:59:25 executing program 5: 05:59:26 executing program 4: 05:59:26 executing program 3: 05:59:26 executing program 1: 05:59:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000014c0)={0x0, 0x0, 0x0}) 05:59:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) 05:59:26 executing program 0: 05:59:26 executing program 3: 05:59:26 executing program 1: 05:59:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:26 executing program 5: 05:59:26 executing program 0: 05:59:26 executing program 3: 05:59:26 executing program 1: 05:59:26 executing program 4: 05:59:26 executing program 5: 05:59:27 executing program 1: 05:59:27 executing program 3: 05:59:27 executing program 0: 05:59:27 executing program 4: 05:59:27 executing program 5: 05:59:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:27 executing program 3: 05:59:27 executing program 0: 05:59:27 executing program 4: 05:59:27 executing program 1: 05:59:27 executing program 5: 05:59:27 executing program 3: 05:59:27 executing program 0: 05:59:27 executing program 4: 05:59:27 executing program 1: 05:59:27 executing program 5: 05:59:27 executing program 1: 05:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:28 executing program 4: 05:59:28 executing program 3: 05:59:28 executing program 0: 05:59:28 executing program 5: 05:59:28 executing program 1: 05:59:28 executing program 4: 05:59:28 executing program 3: 05:59:28 executing program 0: 05:59:28 executing program 5: 05:59:28 executing program 1: 05:59:28 executing program 4: 05:59:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:28 executing program 3: 05:59:28 executing program 4: 05:59:28 executing program 0: 05:59:28 executing program 5: 05:59:28 executing program 1: 05:59:29 executing program 4: 05:59:29 executing program 1: 05:59:29 executing program 5: 05:59:29 executing program 3: 05:59:29 executing program 0: 05:59:29 executing program 1: 05:59:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:29 executing program 4: 05:59:29 executing program 5: 05:59:29 executing program 3: 05:59:29 executing program 0: 05:59:29 executing program 1: 05:59:29 executing program 3: 05:59:29 executing program 1: 05:59:29 executing program 5: 05:59:29 executing program 0: 05:59:29 executing program 4: 05:59:29 executing program 1: 05:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x1ff) close(0xffffffffffffffff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x600, 0x0) 05:59:30 executing program 3: 05:59:30 executing program 0: 05:59:30 executing program 4: 05:59:30 executing program 5: 05:59:30 executing program 1: 05:59:30 executing program 5: 05:59:30 executing program 3: 05:59:30 executing program 0: 05:59:30 executing program 1: 05:59:30 executing program 4: 05:59:30 executing program 1: 05:59:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:30 executing program 0: 05:59:30 executing program 3: 05:59:30 executing program 5: 05:59:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="ffc0"], 0x2) sendfile(r0, r1, 0x0, 0x2) 05:59:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x4, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="10082bbd7000fcdbdf250a0000007800030014000600fe8000000000000000000000000000aa14000600fe8000000000000000000000000000aa080007004e2200001400020073797a5f74756e000000000000000000080007004e2000001400020076657468315f746f5f7465616d00000014000600fe88000000000000000000000000010108000500744c0000080006000800000008000600ffffffff0800060000040000240001000800050003000000080004004e22000008000600736564000800060064680000"], 0x1}, 0x1, 0x0, 0x0, 0x8015}, 0xd0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 05:59:31 executing program 0: sync() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:59:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x3f00}}, 0x152610) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 05:59:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) close(r0) 05:59:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) dup2(r1, r0) 05:59:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) dup2(r1, r0) 05:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:31 executing program 0: sync() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:59:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000980)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x5d, 0x239bffffffffffb) 05:59:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) close(r0) 05:59:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000003c0), 0x4) ioctl$KDGKBMETA(r0, 0x4b62, 0x0) 05:59:31 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000006c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x14f1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000240)=0xc) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000680)=0x0) r6 = getpgrp(r5) write$binfmt_elf64(r4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x78d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r6}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) fsync(r3) ioctl$ASHMEM_SET_PROT_MASK(r8, 0x40087705, &(0x7f0000000280)={0x100000000}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000, r6}) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000000c0)='syzkaller1\x00', 0x10) io_setup(0x20, &(0x7f0000000300)=0x0) io_cancel(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x423, r8, 0x0, 0x0, 0xf, 0x0, 0x0, r8}, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r8, r10, &(0x7f0000d83ff8), 0x8000fffffffe) 05:59:31 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004111, &(0x7f00000000c0)) 05:59:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:32 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x49}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 448.970826] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:59:32 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) 05:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100), 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:32 executing program 4: r0 = inotify_init1(0x80800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) membarrier(0x0, 0x0) 05:59:32 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)) [ 449.312155] IPVS: ftp: loaded support on port[0] = 21 05:59:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100), 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) [ 449.487560] ptrace attach of "/root/syz-executor4"[12183] was attempted by "/root/syz-executor4"[17039] 05:59:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000006f80)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006ec0)=[{{0x0, 0x0, &(0x7f0000006d40)=[{&(0x7f0000006240)="86e498dfbabaa325b7608df068108a7fd2b7dcfb7dba67d3f5dc731c2cf0cb2a", 0x20}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) [ 449.538932] ptrace attach of "/root/syz-executor4"[12183] was attempted by "/root/syz-executor4"[17039] 05:59:32 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0xffffffffffffffff, r1) [ 449.805974] ptrace attach of "/root/syz-executor4"[12183] was attempted by "/root/syz-executor4"[17052] [ 449.882253] ptrace attach of "/root/syz-executor4"[12183] was attempted by "/root/syz-executor4"[17054] 05:59:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000140)=""/26, 0x1a}, {&(0x7f0000000180)=""/137, 0x89}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000240)=""/82, 0x52}, {&(0x7f0000000400)=""/6, 0x6}, {&(0x7f0000000440)=""/33, 0x21}], 0x6, &(0x7f0000000500)=""/45, 0x2d}, 0x100000000}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/155, 0x9b}], 0x1, &(0x7f0000000640)=""/67, 0x43}, 0x3}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000880)=""/4, 0x4}, {&(0x7f00000008c0)=""/37, 0x25}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x3, &(0x7f0000000940)=""/27, 0x1b}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)=""/26, 0x1a}, {&(0x7f00000009c0)=""/78, 0x4e}, {&(0x7f0000000a40)=""/239, 0xef}], 0x3, &(0x7f0000000b80)=""/233, 0xe9}}], 0x4, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100), 0x0, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000004c0)={0x6, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfffffffffffffffe, @loopback}, {0xa, 0x4e25, 0x3ff, @remote, 0x2}, r1}}, 0x48) 05:59:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 450.693531] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:59:33 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 05:59:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffff801, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:33 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 05:59:33 executing program 4: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x1) r0 = open(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x1264, 0x0) 05:59:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148f", 0x2a) 05:59:34 executing program 1: ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000280)={0x400, 0xffffffffffffb021, 0xc6c, 0xfffffffffffff801, [], [], [], 0x0, 0x5, 0x0, 0x4, "c1da1771a2d7c6fed2e1b27582869d2c"}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:34 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) close(r0) socket$unix(0x1, 0x2, 0x0) getegid() setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x9, @remote}}, 0x0, 0x0, 0x0, "960622fcf15932064ccbd168c6a88b6b8f59a5fa67c2c26c265a19a562ca543926be646850e69e144245f0ad930977fdb32dbabc57729fe91a718720ec68b0cd9486834e9df79a1a8f35e55bd7f219e0"}, 0xd8) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x16, @loopback, 0x0, 0x3, 'sh\x00', 0x0, 0x8, 0x7a}, {@loopback, 0x4e20, 0x4, 0x7, 0xfffffffffffffe8e, 0x101}}, 0x44) 05:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="afbd001b79", 0x5) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x7ffff000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 05:59:34 executing program 0: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xa) timer_create(0x8, &(0x7f0000000300)={0x0, 0x8, 0x0, @thr={0x0, 0x0}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @dev, @multicast2}, &(0x7f00000007c0)=0xc) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x5) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0x5, 0x1f, 0xfffffffffffffffd, 0x800}, 0xf) getdents64(r0, &(0x7f0000000700)=""/161, 0xa1) ioctl$TCSBRK(r0, 0x5409, 0x63a) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x3, @mcast2, 0x4}, 0x1c) ioctl$FITRIM(r1, 0xc0185879, 0x0) r3 = request_key(&(0x7f00000005c0)='rxrpc_s\x00', 0x0, &(0x7f0000000640)='\x00', 0xfffffffffffffffa) r4 = add_key(0x0, &(0x7f0000000980)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r4) truncate(&(0x7f00000001c0)='./file0\x00', 0x8d2) shutdown(r2, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000400)=r5) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$TIOCSCTTY(r1, 0x540e, 0x100000000) setgid(r6) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000001d80), 0x800) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000009c0), 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r7, 0x110, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 05:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffff801, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0xffffffffffffff99) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$setown(r2, 0x8, 0x0) lstat(0x0, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) 05:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) 05:59:35 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) io_setup(0x7ff, &(0x7f0000000040)=0x0) io_destroy(r1) 05:59:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) [ 452.897395] syz-executor4 (17163) used obsolete PPPIOCDETACH ioctl 05:59:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="afbd001b79", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000080)=""/132, 0x84}], 0x1}, 0x0) 05:59:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x19, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x78) 05:59:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x0) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:36 executing program 4: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0xffffffffffffffff) open(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) 05:59:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000006c0)="3b3553cc94c9a1af4281919e3da66da4", 0x10}], 0x1}, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:59:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(0xffffffffffffffff) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept$inet(0xffffffffffffff9c, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) modify_ldt$write(0x1, 0x0, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) 05:59:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$EVIOCGREP(r0, 0x80047441, 0x0) 05:59:37 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0x5, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 05:59:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffff801, 0x0) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 05:59:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) epoll_create1(0x0) write$P9_RMKNOD(r2, 0x0, 0x0) getpid() write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r3, 0x0, 0x0) 05:59:37 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xcb, 0x0, 0x0) 05:59:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="230000001a000703e4050c00e69be20180a0d6f5c00fea0c73dd4af276161bf53e8047", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) gettid() socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:59:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff854) prctl$PR_GET_TIMERSLACK(0x1e) syz_execute_func(&(0x7f0000000040)="3666440f9bf56664400f9f3241c3260fac6a0f00c4c27d794e003e0f1158100019c401ab5d1184cdc4626d98edcd0fc4017f126dcc") 05:59:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 05:59:37 executing program 3: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) 05:59:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x600, 0x0) 05:59:38 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB='./file0'], 0x0, &(0x7f0000000080)='squashfs\x00', 0x0, 0x0) [ 455.235466] encrypted_key: insufficient parameters specified [ 455.270842] encrypted_key: insufficient parameters specified 05:59:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0), 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 05:59:38 executing program 3: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) 05:59:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000) 05:59:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:59:38 executing program 0: r0 = socket(0x10, 0x3, 0x6) write(r0, &(0x7f0000000000)="1f0000001000ff00fd01000000000800000501fe070001000404c16ae4bc00", 0x1f) 05:59:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x600, 0x0) 05:59:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:59:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) close(r0) 05:59:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000540)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000002c0)='h', 0x1) close(0xffffffffffffffff) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000180)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 05:59:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) close(r0) 05:59:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 05:59:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x600, 0x0) 05:59:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f6ff970411b"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:39 executing program 0: r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x14, 0x0, &(0x7f0000000000)) 05:59:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:40 executing program 4: 05:59:40 executing program 0: 05:59:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:40 executing program 4: 05:59:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:40 executing program 5: 05:59:40 executing program 0: 05:59:40 executing program 4: 05:59:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x0, 0x0) 05:59:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:40 executing program 5: 05:59:40 executing program 0: 05:59:40 executing program 3: 05:59:40 executing program 4: 05:59:40 executing program 0: 05:59:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:41 executing program 3: 05:59:41 executing program 5: 05:59:41 executing program 4: 05:59:41 executing program 0: 05:59:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x0, 0x0) 05:59:41 executing program 3: 05:59:41 executing program 4: 05:59:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:41 executing program 0: 05:59:41 executing program 5: 05:59:41 executing program 3: 05:59:41 executing program 4: 05:59:41 executing program 5: 05:59:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:41 executing program 0: 05:59:41 executing program 3: 05:59:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x0, 0x0) 05:59:42 executing program 4: 05:59:42 executing program 0: 05:59:42 executing program 5: 05:59:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:42 executing program 3: 05:59:42 executing program 3: 05:59:42 executing program 4: 05:59:42 executing program 0: 05:59:42 executing program 5: 05:59:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:42 executing program 4: 05:59:42 executing program 4: 05:59:42 executing program 3: 05:59:42 executing program 5: 05:59:42 executing program 0: 05:59:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:43 executing program 2: 05:59:43 executing program 4: 05:59:43 executing program 5: 05:59:43 executing program 3: 05:59:43 executing program 0: 05:59:43 executing program 2: 05:59:43 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:43 executing program 4: 05:59:43 executing program 5: 05:59:43 executing program 3: 05:59:43 executing program 0: 05:59:43 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:43 executing program 2: 05:59:43 executing program 4: 05:59:43 executing program 5: 05:59:43 executing program 3: 05:59:43 executing program 0: 05:59:44 executing program 4: 05:59:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:44 executing program 2: 05:59:44 executing program 5: 05:59:44 executing program 3: 05:59:44 executing program 0: 05:59:44 executing program 5: 05:59:44 executing program 4: 05:59:44 executing program 3: 05:59:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x599) 05:59:44 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) set_mempolicy(0x0, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) r0 = gettid() symlink(0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) lseek(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) syz_open_procfs$namespace(0x0, 0x0) tkill(r0, 0x1000000000016) 05:59:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0xffffff93, 0x0, 0xffffff90, 0x0, @time, {}, {}, @result}], 0x30) 05:59:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ff58"], 0x2) sendfile(r0, r1, &(0x7f0000d83ff8), 0x2) 05:59:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8000000089f3, &(0x7f0000000180)={'ip6tnl2\x00l\x00', @ifru_flags}) 05:59:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 05:59:44 executing program 0: 05:59:45 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40040) 05:59:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000004000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000006f80)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006ec0)=[{{0x0, 0x0, &(0x7f0000006d40)=[{&(0x7f0000006240)="86e498dfbabaa325b7608df068108a7fd2b7dcfb7dba67d3f5dc731c2cf0cb2a7298210225e6953b944dd20167d35a93b6182d793bb6ee9dbae91ffe3e1f04ab", 0x40}], 0x1}}], 0x1, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/126, 0x7e, 0x0, 0x0, 0x0) 05:59:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:45 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') dup3(r0, r1, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='./file0\x00', 0x0, 0x1080, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) [ 462.110040] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) 05:59:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000240)="ccfa35ba6b4dec4de4e3946ae1494cee964e84d8b06fb1cbb93741833008a47cade2c3d5147184101a58bd261cba39804787dac43892e642f062e48655589a9f554da21ed3824541520d4b6eeab95e745c12afaf343e852ea050d7f8037db5f9e5599693df3e9141dc525dc4ebafcd7d", 0x70, 0xffffffffffffffff, 0x0, 0x0) 05:59:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/107, 0x6b}], 0x1) dup2(r1, r0) 05:59:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x9, 0x4000000000000800, 0x1}, 0x1d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), 0x0}, 0x20) 05:59:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") unshare(0x4000400) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0xa}) 05:59:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1ff) close(r1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x500, 0x0) 05:59:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x8010aebb, &(0x7f0000000100)) 05:59:45 executing program 2: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 05:59:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") unshare(0x4000400) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0xa}) 05:59:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:46 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x1ff) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x600, 0x0) 05:59:46 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000002c0)={0x0, 0x1, [{}]}) 05:59:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="afbd001b79", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000080)=""/132, 0x84}, {&(0x7f0000000200)=""/181, 0xb5}], 0x2}, 0x0) 05:59:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r2, &(0x7f00000000c0), 0x2c3) 05:59:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="86", 0x1) 05:59:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) add_key$user(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x995, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) getcwd(0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) fcntl$setstatus(r1, 0x4, 0xc00) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f00)={0x0, @local, @dev}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) 05:59:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000100), 0x3dc) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) 05:59:46 executing program 2: perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$tipc(0x1e, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000340), 0x1c) timer_settime(0x0, 0x0, &(0x7f0000000680)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) prctl$PR_GET_NO_NEW_PRIVS(0x27) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x4, 0xfa0e, {0x0}}, 0xffffffffffffff4f) dup3(r0, r2, 0x0) tkill(r1, 0x1002000000016) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000062b000/0x18000)=nil, 0x0, 0x400000000000, 0x0, 0x0, 0x0) 05:59:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:46 executing program 3: r0 = gettid() getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, 0x0, &(0x7f0000000380)) io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}, 0x0) r1 = memfd_create(&(0x7f0000000100)='!-\x00', 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3f) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3}}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240), 0x13f, 0x100b}}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) wait4(r0, &(0x7f0000000200), 0x0, 0x0) close(r2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) 05:59:47 executing program 0: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000140)=""/11, 0x238) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) r2 = fcntl$dupfd(r0, 0x0, r1) clone(0x1102001bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_SETMODE(r2, 0x5602, 0x0) 05:59:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) 05:59:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') 05:59:47 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 05:59:47 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) 05:59:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) 05:59:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="8986dd2d856d7d5231d591990cddce4335e763031d2f4adf3ddd4dde29f2cf43cd16e039eb240445148fddf207794dfb", 0x30) 05:59:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffff}) 05:59:48 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKBSZSET(r1, 0x40081271, 0x0) creat(&(0x7f0000000280)='./file1\x00', 0x7) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 05:59:48 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)) 05:59:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) 05:59:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x457a) 05:59:48 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000008c0)=ANY=[]}}, 0x40000) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRES64], 0x3de}}, 0x800) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14, 0x7fffe) getsockopt(r1, 0x9, 0x8, &(0x7f0000000540)=""/59, &(0x7f0000000580)=0x3b) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x1) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000c00)=""/228) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f00000004c0), &(0x7f0000000340)=0x68) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = socket$inet6(0xa, 0x800, 0xc270) r6 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) write$FUSE_IOCTL(r7, 0x0, 0x0) setsockopt(r0, 0x2, 0x3a, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') write$P9_RCLUNK(r7, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) write$P9_RSTATFS(r4, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x7, 0xe4, 0x8, 0x384f7645, 0x1, 0x3, 0x4000000000000009, 0x0, 0x59}}, 0x43) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) ioctl$sock_ifreq(r4, 0x8956, &(0x7f00000001c0)={'veth0_to_bond\x00', @ifru_addrs=@ax25={0x3, @remote, 0x40}}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, 0x0, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) 05:59:48 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:59:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8000000089f3, &(0x7f0000000180)={'ip6tnl2\x00l\x00', @ifru_flags}) 05:59:48 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) pipe(&(0x7f0000000380)) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 05:59:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)=0x2) dup2(r2, r1) 05:59:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x100000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 05:59:49 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) getegid() writev(r0, &(0x7f00000023c0), 0x1000000000000252) 05:59:49 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 05:59:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) write$evdev(r1, &(0x7f00000000c0)=[{{0x77359400}}], 0x18) 05:59:49 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x1fe) 05:59:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x541f, &(0x7f0000000180)) 05:59:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000004c0)=""/248, 0xf8}], 0x1, 0x0) [ 466.490736] Unrecognized hibernate image header format! [ 466.496406] PM: Image mismatch: architecture specific data [ 466.511371] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 [ 466.633138] tty_tiocsserial: 'syz-executor2' is using deprecated serial flags (with no effect): 00000100 05:59:50 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x400001, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/ptmx\x00', 0xfffffffffffffffb, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(&(0x7f00000010c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000d00)=ANY=[@ANYBLOB="3897c61e23d3971024b0e8eb675766d6275488bb0fb34f52ffa1089a3f3a2dda6cac0800005d2fef6de3890668ac6d16dcf001c0c3704e9f3f984b6b7b1039cfd93e445671550a8131d137421148ffcdbfa85589f48b9d15de7f1bb64120416f36d474d5e53c1819ee539f4a9ac622ec6deeb3c15fe0453b88509e0d323400a9566cb0fb50f81462a925fa6bb5bc41f79841c0111644b05c7b468da6e713e27ea40b5ff2cf494ba3d1eafa01ce22bd4af421ee5c3953085bd5d8f5"], 0x0, 0x0, 0x100000, &(0x7f0000444000)) mount(&(0x7f0000001100)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f0000001040)='anon_inodefs\x00', 0x80010, 0x0) mount(&(0x7f0000001580)=ANY=[@ANYBLOB="7f26c5d2ad7b1bd2bd00000000d84f00876ae6f704a917cc03ddfa328abf305d89eac47da21f692048eb26a96fe6dd651b3f7f357fa5abb196532e7179785fd90daf457128daead58e6361cf6b657f1f552770e3d6a50b8a8e2c772b6433374b105d48eb72bbea1b6f7006ad1c398fe700b5e605df3f3366620e210bc0f35cedd3018330b95c12ff1d0cdbdbffebb8069c0ddf6fe069c08745c3cd676f8b1c455dbf9812e47e7df667e7521cdeaf97e3"], 0x0, 0x0, 0x80000, &(0x7f000002f000)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x5010, &(0x7f00000e7000)) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) ioctl$int_out(r3, 0x2000005460, &(0x7f0000001080)) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r2) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000001640)="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") write$P9_RWRITE(r4, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0x1}, 0xb) socket$inet6_udplite(0xa, 0x2, 0x88) 05:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:50 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 05:59:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2}) 05:59:50 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) [ 467.405506] input: syz1 as /devices/virtual/input/input7 05:59:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00\x00\x00\x00\xf9\x8b\x00'}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:50 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 05:59:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 467.853637] pit: kvm: requested 56990 ns i8254 timer period limited to 200000 ns 05:59:51 executing program 2: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKROGET(r1, 0x125e, 0x0) [ 467.904100] pit: kvm: requested 43580 ns i8254 timer period limited to 200000 ns 05:59:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) [ 467.952427] pit: kvm: requested 30171 ns i8254 timer period limited to 200000 ns [ 467.990251] pit: kvm: requested 30171 ns i8254 timer period limited to 200000 ns 05:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 05:59:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) close(r1) 05:59:51 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8000001040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) execveat(r1, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 05:59:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 05:59:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0xf0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) 05:59:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)) 05:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0xffffffffffffff41, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 05:59:52 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x1fe) 05:59:52 executing program 2: unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) 05:59:52 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000000300)=[{r0, 0x2040}, {r1}], 0x2, 0x0) 05:59:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:52 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) [ 469.807499] binder: BINDER_SET_CONTEXT_MGR already set [ 469.813103] binder: 17930:17931 ioctl 40046207 0 returned -16 05:59:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x2, 0x2}, 0x10}}, 0x0) 05:59:52 executing program 1: ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:53 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000680)="0a5c1f023c126285719070") getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000300)={'ipvs\x00'}, &(0x7f0000000340)=0x1e) 05:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:53 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:53 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x87) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r0, &(0x7f00004d4000)=@nl=@proc, 0x0, 0x0) 05:59:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 05:59:53 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:53 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00662fd5e3c402990705bb6b0000c4d4019dccd319418c07") mknod(&(0x7f00000000c0)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, 0x0) ptrace(0x11, r0) 05:59:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:53 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:53 executing program 3: socket$unix(0x1, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) getgid() listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) close(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) epoll_create1(0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) 05:59:53 executing program 1: syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000080)={0x0, 0x800}) 05:59:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x0, 0x0, 0x0, 0x8}}) 05:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:54 executing program 2: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r0, &(0x7f00000000c0), 0x2c3) 05:59:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000002c0)=0x4) write$tun(r0, &(0x7f00000001c0)={@val, @val, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}, @gre}}, 0x66) 05:59:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fb73f9f"]) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:59:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 05:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:54 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x11000, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) 05:59:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x2, 0x4fb) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 05:59:54 executing program 2: syz_open_procfs(0x0, &(0x7f0000000300)='map_files\x00') 05:59:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)) 05:59:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000001c0)) fsetxattr(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], &(0x7f0000000300)='ppp0\x00', 0x5, 0x2) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20440, 0x0) r3 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0x80800) setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) listen(r1, 0x87) fcntl$getownex(r3, 0x10, &(0x7f0000000380)) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) timer_getoverrun(0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000080), 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x3800000000000000, {0x3f000000, 0x0, 0x0, 0xb00}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000400)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0), 0x1c) [ 471.851120] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x40000000015, 0x5, 0x0) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000006080)=[{&(0x7f0000000080)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, 0x0}], 0x1, 0x0) 05:59:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0xffffff19, 0x80800) socket$alg(0x26, 0x5, 0x0) semget$private(0x0, 0x0, 0x80) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r2 = semget(0x3, 0x0, 0x4c6) shmget(0x0, 0x9000, 0x8, &(0x7f0000ff7000/0x9000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x7c000008, &(0x7f0000ff9000/0x3000)=nil) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) shmget(0x3, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmget(0x2, 0x4000, 0x82, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffa000/0x2000)=nil) shmget$private(0x0, 0x400000, 0x20, &(0x7f0000c00000/0x400000)=nil) shmctl$SHM_LOCK(0x0, 0xb) semctl$SETVAL(r2, 0x0, 0x10, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000540)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) r3 = getpgrp(0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 05:59:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:55 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @dev}, @remote, @mcast1, 0x0, 0x0, 0x0, 0x106}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:55 executing program 2: lstat(0x0, 0x0) lstat(0x0, 0x0) removexattr(0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) close(r0) 05:59:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000200)={0x77359400}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/ptmx\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r1, 0x1, r2) getegid() write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 05:59:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0xffffff19, 0x80800) socket$alg(0x26, 0x5, 0x0) semget$private(0x0, 0x0, 0x80) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r2 = semget(0x3, 0x0, 0x4c6) shmget(0x0, 0x9000, 0x8, &(0x7f0000ff7000/0x9000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x7c000008, &(0x7f0000ff9000/0x3000)=nil) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) shmget(0x3, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmget(0x2, 0x4000, 0x82, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x400000, 0x20, &(0x7f0000c00000/0x400000)=nil) r3 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000e63000/0x2000)=nil) shmctl$SHM_LOCK(r3, 0xb) semctl$SETVAL(r2, 0x0, 0x10, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000540)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) r4 = getpgrp(0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) 05:59:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:56 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 05:59:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @local}}}, 0x108) 05:59:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001500)="9bdba7f4", 0x4) 05:59:56 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 05:59:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') sendfile(r0, r2, 0x0, 0x800) write$P9_RFLUSH(r1, 0x0, 0x0) 05:59:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:59:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x20040, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7a, 0x0, [0x4b564d01, 0x35fd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:59:57 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 05:59:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:59:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) 05:59:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, r0) 05:59:58 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 05:59:58 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$TIOCSBRK(r2, 0x40044591) mknod(&(0x7f00000000c0)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, 0x0) ptrace(0x11, r0) 05:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:59:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) 05:59:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000600)=@newlink={0x3c, 0x10, 0x511, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x3c}}, 0x0) 05:59:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:58 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 05:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500), 0x0) 05:59:58 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) [ 475.503453] netlink: 'syz-executor2': attribute type 9 has an invalid length. [ 475.585332] netlink: 'syz-executor2': attribute type 9 has an invalid length. 05:59:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/149) 05:59:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) [ 475.642940] binder: release 18220:18221 transaction 3 out, still active [ 475.649908] binder: undelivered TRANSACTION_COMPLETE 05:59:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:59:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500), 0x0) [ 475.744905] binder_alloc: binder_alloc_mmap_handler: 18220 20003000-20006000 already mapped failed -16 [ 475.805686] binder: BINDER_SET_CONTEXT_MGR already set [ 475.811231] binder: 18220:18221 ioctl 40046207 0 returned -16 [ 475.892911] binder_alloc: 18220: binder_alloc_buf, no vma [ 475.898633] binder: 18220:18234 transaction failed 29189/-3, size 0-0 line 2973 05:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) [ 475.967443] binder: undelivered TRANSACTION_ERROR: 29189 [ 475.973287] binder: send failed reply for transaction 3, target dead 05:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500), 0x0) 05:59:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffa000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil}) 05:59:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xdd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 05:59:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r0, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:59:59 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 05:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r0, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdb", 0x2) 05:59:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0xffffff19, 0x80800) socket$alg(0x26, 0x5, 0x0) semget$private(0x0, 0x0, 0x80) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r2 = semget(0x3, 0x0, 0x4c6) shmget(0x0, 0x9000, 0x8, &(0x7f0000ff7000/0x9000)=nil) shmget(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x7c000008, &(0x7f0000ff9000/0x3000)=nil) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) shmget(0x3, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmget(0x2, 0x4000, 0x82, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffa000/0x2000)=nil) shmget$private(0x0, 0x400000, 0x20, &(0x7f0000c00000/0x400000)=nil) r3 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000e63000/0x2000)=nil) shmctl$SHM_LOCK(r3, 0xb) semctl$SETVAL(r2, 0x0, 0x10, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000540)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) r4 = getpgrp(0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, 0x0) 05:59:59 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$sndseq(r0, &(0x7f00000022c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect={{0x81, 0x6}}}], 0x30) 05:59:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r0, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 05:59:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 05:59:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdb", 0x2) 06:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:00 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdb", 0x2) 06:00:00 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 06:00:00 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syncfs(r0) 06:00:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7", 0x3) 06:00:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], []]}, 0x578) 06:00:01 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="399e22f8", 0x4) 06:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7", 0x3) 06:00:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:01 executing program 1: r0 = socket(0x1e, 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(0xffffffffffffffff, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001500)="9bdba7", 0x3) 06:00:01 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') sendfile(r0, r0, 0x0, 0x800) 06:00:01 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000a, 0x0) write$smack_current(r0, &(0x7f0000000000)='Qdev/sequencer\x00', 0xf) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) fchmodat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) memfd_create(&(0x7f00000019c0)='keyring\x00', 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000001a00)='/dev/vcs#\x00', 0x9ea, 0x0) read$eventfd(r2, &(0x7f0000001ac0), 0xfffffffffffffd3a) keyctl$chown(0x4, r1, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') modify_ldt$read(0x0, &(0x7f0000000180)=""/67, 0x43) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/225, 0xe1}, {0x0}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f0000000440)=""/117, 0x34d}, {0x0}, {&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/208, 0xd0}], 0x8, &(0x7f0000001880)=""/128, 0x80, 0xa0}, 0xb18adc9706b39d51) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000001940)={{0x2c, @broadcast, 0x0, 0x0, 'rr\x00', 0x1, 0x7fff, 0x64}, {@multicast1, 0x0, 0x1, 0x5, 0x0, 0x1}}, 0x44) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000040), 0x4) keyctl$setperm(0x5, r1, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x101000, 0x0) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x100000001) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, 0x0, &(0x7f0000000840)) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000880)=@assoc_value={0x0, 0x8}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000001b00)=ANY=[@ANYBLOB="1b0b21e2a62d0a300cf121867a8c5fd29c07e21e333f3bb55cfbef9c8a25193cb0b9b7c39c12edc4d1c98b5d2ff6924dbabd1f2c1413a3ce08f4f69ac175826de7c722bfb43e65ae0670232b333ea3c15cb264a3eca70bb4f2c06af3430c3ccb86284c9f851c861ac40cf3955edfe463de3508072d5d834b7646c56648", @ANYRES32, @ANYRESHEX=0x0], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 06:00:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:01 executing program 1: r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:02 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xffff) 06:00:02 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = accept(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x0, @broadcast, 0x0, 0x0, 'sh\x00', 0x2}, 0x2c) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) 06:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:02 executing program 1: r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:02 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 06:00:02 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r1) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 06:00:02 executing program 0: r0 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="5500000018007f8500fe01b2a4a280930a06000000a8430891000000390009003500000000000000029292d316d70ddda3b0001900150000000000000000dc1300d54400009b84136ef75afb83fb448daa7227c43a", 0x55}], 0x1}, 0x0) 06:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:02 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:02 executing program 5: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) futex(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0) 06:00:02 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(0xffffffffffffffff, 0x0) 06:00:03 executing program 2: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) futex(0x0, 0x400000085, 0x0, 0x0, 0x0, 0x40a0000001) 06:00:03 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fadvise64(r0, 0x0, 0x0, 0x2) 06:00:03 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:03 executing program 5: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) 06:00:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) read$eventfd(r2, &(0x7f0000000000), 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) close(r1) 06:00:03 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:03 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) close(r0) 06:00:03 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r1, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 06:00:03 executing program 5: 06:00:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:03 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:03 executing program 0: 06:00:03 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:04 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/softnet_stat\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x0) 06:00:04 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000080)={0x22}, 0x14) 06:00:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:04 executing program 0: socket$kcm(0x2, 0xa, 0x300) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={0x0, 0x0, 0x18}, 0x9a) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00\x00\x00t\xca\x1bq\x032-x\x00', 0x802}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1}, 0x48) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0x12) close(0xffffffffffffffff) 06:00:04 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:04 executing program 5: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000008e00) 06:00:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:04 executing program 5: 06:00:04 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:04 executing program 2: 06:00:04 executing program 0: 06:00:05 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:05 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:05 executing program 5: 06:00:05 executing program 2: 06:00:05 executing program 0: 06:00:05 executing program 5: 06:00:05 executing program 2: 06:00:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:05 executing program 0: 06:00:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:05 executing program 5: 06:00:05 executing program 0: 06:00:05 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:05 executing program 2: 06:00:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:05 executing program 5: 06:00:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:06 executing program 2: 06:00:06 executing program 5: 06:00:06 executing program 0: 06:00:06 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 06:00:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:06 executing program 2: 06:00:06 executing program 5: 06:00:06 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:06 executing program 0: 06:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:06 executing program 5: 06:00:06 executing program 2: 06:00:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:07 executing program 5: 06:00:07 executing program 0: 06:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0fae3f9f"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:07 executing program 2: 06:00:07 executing program 0: 06:00:07 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:07 executing program 5: 06:00:07 executing program 2: 06:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:07 executing program 0: 06:00:08 executing program 5: 06:00:08 executing program 0: 06:00:08 executing program 2: 06:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:08 executing program 0: 06:00:08 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:08 executing program 5: 06:00:08 executing program 2: 06:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:08 executing program 0: 06:00:09 executing program 5: 06:00:09 executing program 0: 06:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:09 executing program 2: 06:00:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:09 executing program 5: 06:00:09 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR], 0x8) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000380)=@xdp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000400)=""/2, 0x2}], 0x1}}], 0xffffff1f, 0x0, 0x0) 06:00:09 executing program 0: 06:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r1, 0x0) 06:00:09 executing program 5: 06:00:09 executing program 2: 06:00:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 486.838239] ================================================================== [ 486.845663] BUG: KMSAN: uninit-value in tipc_conn_rcv_sub+0x187/0x9f0 [ 486.852256] CPU: 0 PID: 12310 Comm: kworker/u4:1 Not tainted 4.20.0-rc7+ #15 [ 486.859451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.868834] Workqueue: tipc_rcv tipc_conn_recv_work [ 486.873903] Call Trace: [ 486.876530] dump_stack+0x173/0x1d0 [ 486.880189] kmsan_report+0x12e/0x2a0 [ 486.884034] __msan_warning+0x82/0xf0 [ 486.887871] tipc_conn_rcv_sub+0x187/0x9f0 [ 486.892148] tipc_conn_recv_work+0x3dc/0x5e0 [ 486.896621] ? tipc_conn_send_work+0x11b0/0x11b0 [ 486.901417] ? tipc_conn_send_work+0x11b0/0x11b0 [ 486.906230] process_one_work+0x1607/0x1f80 [ 486.910617] worker_thread+0x111c/0x2460 [ 486.914752] kthread+0x4a1/0x4e0 [ 486.918133] ? process_one_work+0x1f80/0x1f80 [ 486.922650] ? schedule_tail+0x1b2/0x410 [ 486.926755] ? kthread_blkcg+0xf0/0xf0 [ 486.930659] ret_from_fork+0x35/0x40 [ 486.934391] [ 486.936021] Local variable description: ----s.i@tipc_conn_recv_work [ 486.942421] Variable was created at: [ 486.946168] tipc_conn_recv_work+0x68/0x5e0 [ 486.950501] process_one_work+0x1607/0x1f80 [ 486.954823] ================================================================== [ 486.962216] Disabling lock debugging due to kernel taint [ 486.967710] Kernel panic - not syncing: panic_on_warn set ... [ 486.973615] CPU: 0 PID: 12310 Comm: kworker/u4:1 Tainted: G B 4.20.0-rc7+ #15 [ 486.982194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.991563] Workqueue: tipc_rcv tipc_conn_recv_work [ 486.996604] Call Trace: [ 486.999228] dump_stack+0x173/0x1d0 [ 487.002891] panic+0x3ce/0x961 [ 487.006248] kmsan_report+0x293/0x2a0 [ 487.010545] __msan_warning+0x82/0xf0 [ 487.014387] tipc_conn_rcv_sub+0x187/0x9f0 [ 487.018663] tipc_conn_recv_work+0x3dc/0x5e0 [ 487.023152] ? tipc_conn_send_work+0x11b0/0x11b0 [ 487.027967] ? tipc_conn_send_work+0x11b0/0x11b0 [ 487.032780] process_one_work+0x1607/0x1f80 [ 487.037154] worker_thread+0x111c/0x2460 [ 487.041309] kthread+0x4a1/0x4e0 [ 487.044694] ? process_one_work+0x1f80/0x1f80 [ 487.049222] ? schedule_tail+0x1b2/0x410 [ 487.053325] ? kthread_blkcg+0xf0/0xf0 [ 487.057233] ret_from_fork+0x35/0x40 [ 487.061914] Kernel Offset: disabled [ 487.065551] Rebooting in 86400 seconds..