000, 0x2}, {0x5, 0x81, 0xfff, 0x8a7}, {0x1000, 0x401, 0x8, 0x9}, {0x58d, 0xb88, 0xfff, 0xff}, {0x5, 0x3ff, 0x1, 0x1}, {0x200, 0x3, 0x873, 0x400}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}]}, 0x278}, 0x1, 0x0, 0x0, 0xd8d0453278ca56f8}, 0x54) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x80011, r0, 0x0) 13:59:05 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x1000fefffff7) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40200, 0xa) syncfs(r0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) fcntl$setsig(r0, 0xa, 0x2b) 13:59:05 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x20000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:05 executing program 3: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) flock(r0, 0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r1, 0x0) 13:59:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xd5a) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) close(r0) 13:59:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80, [], 0x13}, @in=@rand_addr=0x78e5, 0x4e21, 0x3, 0x4e21, 0xd1, 0xa, 0x80, 0x80, 0xff, 0x0, r2}, {0x20, 0x4, 0xffffffffffffff77, 0xe6, 0x80000000, 0x401, 0x10000, 0x496}, {0xd1, 0x100000000, 0x6, 0xffffffffffffff93}, 0x5, 0x0, 0x3, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d2}, 0xa, @in6, 0x34ff, 0x4, 0x0, 0x80, 0x7, 0x4, 0x7fffffff}}, 0xe8) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x12, r0, 0x0) close(r0) 13:59:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x101) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7) 13:59:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgid(0xffffffffffffffff) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000002c0)=[0xee01, 0xffffffffffffffff, 0xee01]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f0000000940)=0xc) r7 = geteuid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)=0x0) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000c00)=0x0) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000ec0)=0x0) getresuid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)=0x0) getresgid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)=0x0) r18 = gettid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0}, &(0x7f00000013c0)=0xc) r20 = getgid() r21 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001a40)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b40)=0xe8) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001c40)={0x0}, &(0x7f0000001c80)=0xc) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getgid() sendmmsg$unix(r1, &(0x7f0000001e00)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="000000001800000000a17643bbef55dcd89e8100", @ANYRES32=r0, @ANYRES32=r0], 0x58}, {&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000400)="fedb0e51ac6568003baffa4489264213723b980a5fa0be7371c3a7a1b0cbfdd6f86a23de58498f99b45e193e5c6b26d839664e", 0x33}, {&(0x7f0000000440)="6b8acfe9ddbede030fbbeac112af11dd22b58bc6d22e8a9e1640d7bf0dd2c9272104e7a199b7074456bc9dc9d0c365f76745a33bd20be3f3dbdc3ca4d2c3c90abb5e05517d93ca6e650001e67f396a2d36c1d5ef08697e749b3337b6b5f8ccdf60de8aa2fa4fb048785d011c35511074d01f1a618fb199dcc9690b2d4edd61ebbb34b4a12efec18cd6defaa1b2eedbc429124aa901855b3c966ec59ba796ef5be1f918219b13671159d5af4dc8418a6146d5", 0xb2}, {&(0x7f0000000500)}, {&(0x7f0000000540)="3f486950106cbb95fdb67db390647d8a16b7afe1b9ddbb51813b2c71d601e3f847b448bbc238e8a305328f0e559b1ba7926a7a4708ecfc0582aa3f53a7ec7e4b68289bb15ff5cfbef575d96fdc95b7238964eafb768f83aa8142fa3ba4f6ea872b26ce11153160c8f37f93f1e4ddbb4ea2c79572632c4cb7f09a4f3f349f5185c4a751d2f1ee7c2c465d2b91747971b8a26aadf25636a2a00033aa69a8638f7b", 0xa0}, {&(0x7f0000000600)}, {&(0x7f0000000700)="6ec6f150a7db52cb47729cc923c9a5cbfdd9ea73c562a4a868907b3158ea4bf0496c08adc132ededda06a11a3d5808f4008d85e48ea68979a2ebc5adc208ede4cfea55713aac63b2989f73478d57090af0fc2132da9d2525a9cd972adfa2a911fdd1e976da7ae3d3aedf0817585a74276671640bd8c7d519087e0aacbc18d558f3a2f87bb0", 0x85}, {&(0x7f00000007c0)="ec876bb2d7087b04438f1739b2ff1f4dede2f02338a65247df8080b1ad320dc7f596c3434376429670f1540fd41ae69f29d100c15e07ee4b727fb3291a8fd062c87fbb2901dd63c197c9c82e2f8d356e03fe6214032e7dc2cd0b2a615ef7e1e56a4e5cbd1175b049380cc6fbbc45d0d0e59891dbd0fb8770e80e2ad01d882786669e37b365132ca662917b7d167909dd6a5eb37488309c6ef21fded2145e19acecbf4d18fb29aeb1e7b0b2ace9943ed0e0b6e2debe0f1bd1febcec8b350b3953e807ebc6944141571105ab2b604216e22633d3aafd424fd6ea51dbacd5d4ecd56d222b994715f4b986cdf104", 0xec}, {&(0x7f0000000640)="7daf77481445a737d61221a619ac06c697a5df5d054e6e06b01d1db44325b271a62882f6304d7e9e6a5f25", 0x2b}], 0x8, &(0x7f0000000d00)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0x60, 0x40}, {&(0x7f0000000d80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000e00)="fd7cd6468b0b1a6950250bc27e110d91c405c47b448d6e56110f6efb56c52c0c2648e6ec5de926e2ba2d1149fd6b31b0669eeaed172bdd2e0edd3d5d0daf89832090d01546be71fef097f4de6fc9cfb0abec4329c6b01d03555307b30e5d55c3fdf673a30e4dafd4c4a00e797d55", 0x6e}], 0x1, &(0x7f0000001080)=[@cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x28, 0x1, 0x1, [r0, r1, r1, r0, r1, r1]}], 0x48, 0x800}, {&(0x7f0000001100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001340)=[{&(0x7f0000001180)="97421b13e5ae919c3083d84a16a9704d3788097b496f90788099987e87e234ed44c87870d84b956f6ccae7dd7d3bc6c10b0c61c859db7dd6ae575cd2163306baa283ad53faf94901639cc2ccd9f6f516ba6eb107da715d3d56ba51380459f42f5b83c492fd8bcd936bb4dc244790c9bbc6", 0x71}, {&(0x7f0000001200)="dc563785409da3695ac48e20297764af2bf450441824f22e67b98e6e77139a374f37a329cb220e2ef3481b5ff18c58852ecc9bcf0d1f1b64d668066311", 0x3d}, {&(0x7f0000001240)="294199806ccc119178bc083786271011006d8da6d8ff28266915b30050ad3244edeed83a6447749638bc662f5196881e9af550223b40f98a686f6d3122614f9464dc469ef031066b8c3d1a46c8c6d72d73e0422d2c37ba56e0de7f90b9ac36d599b39f95749aae55fa8df28492debfdf8d6a16aa25875f2f2367403a3bb3cf298df600d9941f3b8e060031f70f89abcc277e63ad31fc69e3315deba52ca36a8afb204f51f6da038c340ed623ab0f51af3347192fffbc39b46244e2a5d273686e2ff147ad2f5c46908057c4cda18af874", 0xd0}], 0x3, &(0x7f0000001400)=[@cred={0x20, 0x1, 0x2, r18, r19, r20}], 0x20, 0x4000000}, {&(0x7f0000001440)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000019c0)=[{&(0x7f00000014c0)="1cc1dbcf9e2c72682c0c288c43fd3f8052a8ee6723d6be85e2511e7285f937e327bbb821fc93581a7c52eb3dc45d221bfdb678c2542420bbdcf7ff66dc468f98e5e81719afc259191b59754c27ffb2673299a5a34064c04f3b10ba6bd424dd47a4e33ca6b40fbcc93303144cb273fb282e52cc3af2b4d94b2078f1df7af84425704b695b07c7b28ef55f487706a5c40085efc91d8445d5a2", 0x98}, {&(0x7f0000001580)="67123a33a9d5c67ab26f253728cf83e747b64f388dbd80d5cf251a35a55c0eabb48a9a1fc4c099c8983ac1969732276d4be441b9c460b378163ac3cb4619cfda0252514f1f4f01e71f98dc2986aad0ee29888cd7c17c0d56bcebe2495550ebf48ef0598c9dbb10fee59c01f01891a11afaca15ee6d2b8876b7f4e5bd3b23f2", 0x7f}, {&(0x7f0000001600)="1f537605934592d17d9b4ca60bc88322b0ee88283fe0ab50644de688f36686751494c645c8d986f0486d3b1acd8357eb0a132b68f207327e862a607d2c58e51c51414be89e66b635b820c987c138ca7dd5916aee7de264cc1e2570ca84b04691a062d463939941d12a703f7a710e7afd14ed9448ac8b62e570371fc017c1970c6a810b9f7520d0891183efe8937c5695861b76d602fe34084f04b6b888301d1c5003d823311b83251fa72729eeec6b941705356ee62128c75e28d6d16dda3c747237ba9ef5d3b4a540", 0xc9}, {&(0x7f0000001700)="285985ce7ad0b3cd81fe5003ca3a142bd67359b484ac271373e75a481ff11f79fcfa463d23a0a6ccbacc379afe46d2bd64158369f907351b5ae4bc47743c", 0x3e}, {&(0x7f0000001740)="7de7c56c98a606c7590b87516dc9b822415a61992c9842225de8fdb19f7e6c65dce4a1b5924d09d92cd61d13a9b3d250059bbb8ba230ec43c2a65ff0ee576ca5b99ce25bd194f3d605898df33e021aa633bdc4b5b9b825a69fdff82438a1c3b5c274a4b3bb608bdb55ed65f2e64c3779d8eac08dadd37c5fc63b243f8a52793563e996bed2b3a5441961344a60be00a2fe507b72cdc05913a8b244c51838b9cdd5e2911879312af06c0d38fe6ac8a01ace6764d83d7581d84228ef7aed1d3619e5e1e23872", 0xc5}, {&(0x7f0000001840)="1258f97ae28fb2bd906cc00223a67947336d763af30998131e2aa9ed1269a7e8420c747ec44d2d24b185e05de86140955307f8309578f92aaff9c423be68e993711e8012bb5550e3c8cf39148ce8a8ede7f2e8b0d71899a74bcae6395aa8a598de49ca4707f06a", 0x67}, {&(0x7f00000018c0)="3d2d524d5d07bfc8d80d2b3a55ed4bd0b0a9f9cdb863fab78b1c2c114a5bf683bc35d2d6283969d7062840e40ee329556eb23de1f80552f043460bc195293b37893879002864624635d22d001abad1c4f5d4b915c6849144c14f9f077fd11a7f3ad709bb510bfb4e1a5413e87f386d7c260cddbc3d3c7775d16935e3bc69136683f4eddcc4c3313e37a83ee43aae94cc7b526d85210d3a27992799ae35f8b1f14c63431232ca389c697d69cb222e1425f2db78faa8777c3bbd7bf1ab92c8313b7bacc5359bc26b672b1ca6ee", 0xcc}], 0x7, &(0x7f0000001d80)=[@cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r24, r25, r26}], 0x58, 0x10}], 0x5, 0x8010) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 13:59:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) socketpair(0x2, 0x5, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(r1, 0x409, 0x2) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:06 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = getuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) prctl$PR_GET_TSC(0x19, &(0x7f0000000300)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x6}, [{0x2, 0x2, r1}], {0x4, 0x1}, [{0x8, 0x1, r2}, {0x8, 0x4, r3}, {0x8, 0x1, r4}, {0x8, 0x2, r5}, {0x8, 0x1, r6}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x2) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x200080, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f00000005c0)={&(0x7f0000000380), 0xc, &(0x7f0000000580)={&(0x7f0000000400)={0x148, r8, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb711}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x13}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x20}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffeffffffff}]}, 0x148}, 0x1, 0x0, 0x0, 0x4010}, 0x20000000) close(r0) 13:59:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xc) 13:59:06 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x506, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040081}, 0x4800) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x800, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0), r0}, 0xffffffffffffff9b) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80011, r2, 0x0) 13:59:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, 0xfffffffffffffffd, 0x20000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000001) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x800) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="1bda7bacf5e0334ec8aa78e7a9f2633031299648e1bcfca244b7a745815504bf2e59415d982bba502e1072df77deb3c022921e54cd5ea8f6af747bef0e564d7f19b2a89243b85cf6736898da1f616fae533865e307800c1a9a1cdc22c45a3b43cb7ba4b9de7a3a05184c59c62203fedd096395e88da729579614dc2aacc410976909fc9b644e4479e46d7bdb9bec03ba0fe8b38f081aaa58ad6d6e7ca23a3eccccbfb70d3a2eb05cb6a57ee16cf13062383a207effe10db2865e5682cb7fea5204a87724f7e0510c9e843ab09e823a73eb91", 0xd2}], 0x1, 0x0, 0x0, 0x40000}, 0x4000000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) close(r0) 13:59:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x280, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x10001, &(0x7f0000000080)={0x80}, 0x8) 13:59:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x1a1080, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000080)) fcntl$setpipe(r1, 0x407, 0x7fffffff) close(r0) 13:59:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x1, 0x2) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000080)) 13:59:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x9, 0x7, 0x93, 0x0, 0x0, 0x4, 0x2, 0xa, 0x7ff, 0x9, 0x80, 0x2, 0xbe7, 0x1e, 0x5, 0x4, 0x1, 0x9, 0x7f, 0x9, 0x1, 0x40, 0x9, 0x6, 0x1, 0x53d, 0x80000001, 0x8, 0x10000, 0x563e9481, 0x7, 0x9, 0x5, 0x3, 0x8001, 0x4, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x2400, 0xdc1e, 0x1, 0x2, 0xff, 0x0, 0x400}, r1, 0x9, r1, 0x8) 13:59:07 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000080)={@remote}, &(0x7f00000000c0)=0x14) 13:59:07 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x47c}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x0, 0x80800) read(r1, &(0x7f0000002000)=""/4096, 0x1000) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ashmem\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x12, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4050) openat(r0, &(0x7f0000000280)='./file0\x00', 0x101002, 0x40140) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) close(r2) 13:59:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x203ffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="74727573746564142f6465762f6173686d656d00"], &(0x7f0000000080)=""/48, 0x30) 13:59:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 13:59:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x10, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) close(r0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) 13:59:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x200040, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd, 0x4000004}, 0xc) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x2000080011, r0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x6, 0x80000008fcf}) 13:59:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) epoll_create(0x4) 13:59:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) fchmod(r0, 0x2) close(r0) 13:59:08 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) 13:59:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000080)="97f4d90f59934ff8cbc68d28a649173b4cc0d1", &(0x7f0000000140)=""/153}, 0x18) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xf) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) close(r1) finit_module(r1, &(0x7f0000000000)='/dev/ashmem\x00', 0x1) openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x480000, 0x0) 13:59:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$RTC_AIE_OFF(r1, 0x7002) fcntl$notify(r0, 0x402, 0x1) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/47) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x78, 0x2, 0x1, "e4a3d26c09919f31178f5bfac86a593a", "599061c51cfabb660b3814d9acc581b17bfd93418128e13e2e1ced03f07f16a72a26dc319271daad9436042d52ce60a221a54b447cbd2c90bb51fe820030da188db60c02cc0994810a1bb056941d930fb95ce2d06f5ce5ca726518a800eb7dd823ef99"}, 0x78, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/netlink\x00') ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000200)="a8c0b5b3a3985a22e896f2dda8238879933dde0e477aae481a8b4459dd5cd7bf096149a3015ab4c258735d55aac2d03b150adfb6b720a55bebc72bbe15fb2cc29f8de92ea9d7793cb3f8633f7cba31ce96603e8ff80085ab") 13:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:08 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x17) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000025c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000002580)='posix_acl_access&[GPL\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002780)=0x0) r6 = geteuid() getgroups(0x5, &(0x7f00000027c0)=[0x0, 0x0, 0x0, 0xee00, 0x0]) sendmsg$unix(r1, &(0x7f0000002840)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000024c0)=[{&(0x7f0000000140)="fe2d7466442fe77db7ec47491924b2bc0e3c4dbe69b45b77f635382ee1cf1eafc24beed568c9548f9bd81d491610611ed200cf423619d8424a77a82fd484aacb39fe382030a1d85ca0a39e2659dd4e7318c0a1d04d7f5ecb32117b11680be8b92b03a16db60337c51cf79d5c50b69e7121e8e5388e3ec1e5", 0x78}, {&(0x7f00000001c0)="79c3bdadf2d961443d3bcce796612149df93adc0e7884d0bae09b60b824bdd0cc32a4845b8828f0d7def57d3231607e7d89f751607033b777db2694763fc221b6da9", 0x42}, {&(0x7f0000000240)="6c09fcf298b152549b4c7a8318ee27668b02676de3559bf371bb48c420a2999caad372fdd9f0907262d5c975b6eb7d480d2941f0e7ffc0ddc26d38f4d136280bdcba198c6db0d28ee2fa7f", 0x4b}, {&(0x7f00000002c0)="8301d9f479fca90ddbaaa343e0de7237f3799210d9955e4ae3f3b60f2612e946bfc5e97bfbf63e824d66d760a6c0d7a2609cafb9ed2576c2a74618609b5cfa40e45305efa4e6cc3a6d33a23d19caa8f4c08b8dfc3f44b05d42d8bb99a7c5c916b7b6b85ecdfa", 0x66}, {&(0x7f0000000340)="a46f79408429f93f3af0782d24278d104d6d4cb019e4cde7cc1289f2239f7ae41b2e3aed96ebe0640e067108b2f06e6856ac108913ef6c8f6418ede2b73f6a6ac0087993578266ec6254b2c93c33ce7c770e57c75c5d636dd35493", 0x5b}, {&(0x7f00000003c0)="71b6544750c6bfbf8a07a274e90a9c5f657115d8c49fec3031621a81bb4c761170e46a82bc69196e82b10b71b373592b33c092859e06b22788f7639055c845f7823f3707e3fd4c3f762b5652b6c66071f09097557d5fdd9046ad6fadd68f18183df7de4cad35521b54066611a21517efd8fd0ab441a4744472e237359522a6fc95a13a5d659bb6f017b8e3807a55e916b3b7241fea8633ef5bb1cfc7dabba8f90cd4390df3c78995e7c67902a73436c47722f77d8dc257948b18123abfbb633d00", 0xc1}, {0xfffffffffffffffd}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="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", 0x1000}], 0x9, &(0x7f0000002800)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x40, 0x40001}, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{&(0x7f00000028c0)=@nl, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002940)=""/146, 0x92}], 0x1, &(0x7f0000002a40)=""/164, 0xa4}, 0x2}], 0x1, 0x40002101, 0x0) getrlimit(0x0, &(0x7f0000002880)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x131ea6a3, 0x280040) close(r0) 13:59:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc0080}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x93}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x21}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) read(r0, &(0x7f0000000000)=""/120, 0x78) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:08 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$void(r0, 0xc0045c78) close(r0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/21, 0x15, 0x20, &(0x7f0000000080)=@file={0xd0f2c122c63aee69, './file0\x00'}, 0x6e) 13:59:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x80011, r0, 0x0) 13:59:08 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:08 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r0) 13:59:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000000c0)=""/35, 0x23}], 0x2, &(0x7f0000000180)=""/68, 0x44}, 0x6}, {{&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)=""/175, 0xaf}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000540)=""/252, 0xfc}], 0x5}, 0x3}, {{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)=""/38, 0x26}, 0x4}, {{&(0x7f00000007c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000840)=""/46, 0x2e}, {&(0x7f0000000880)=""/50, 0x32}, {&(0x7f00000008c0)=""/129, 0x81}], 0x3}, 0x4}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000009c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/25, 0x19}, {&(0x7f0000000a40)=""/81, 0x51}, {&(0x7f0000000ac0)=""/64, 0x40}], 0x4}, 0x8a5b}, {{&(0x7f0000000b40)=@generic, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000bc0)=""/63, 0x3f}, {&(0x7f0000000c00)=""/202, 0xca}, {&(0x7f0000000d00)=""/169, 0xa9}, {&(0x7f0000000dc0)=""/107, 0x6b}, {&(0x7f0000000e40)=""/102, 0x66}], 0x5, &(0x7f0000000f40)=""/4096, 0x1000}, 0x7ff}], 0x6, 0x142, &(0x7f00000020c0)) r1 = syz_open_dev$binder(&(0x7f0000002100)='/dev/binder#\x00', 0x0, 0x2) tee(r0, r1, 0xb520, 0x1) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x3, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) close(r2) [ 283.609763] binder: 18231:18233 ioctl 40087703 fffffffb returned -22 13:59:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r2 = geteuid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="de9a29ae508d2ce2130daa28e263a19c8d3e09553ec40d3afd240190a7bae4a0c8be2733a89ed776c5798edfae869a4dfa635f81f2c1def22f68716f651af6f9b5e907d24e23ea5b60e4ba8c31ae0102f7d357a50e1d7e7d6357240888002ce070d2d36852c95a629039094ee33e7f851e27d17edc9ff876c7fea3e6c22e73408875b5b421f60fb58e2272235941d4397ec0c2d7d551c7f28eb25ac42bc7aeb14f88fd210db4e812b2efcdafc03880b573", 0xb1, 0xff}, {&(0x7f0000000080)="93654a99d4c5020626c1e2b047408dfb894e8da4281d74da6b324896ea01d5186e054d587d928c533a68537c14aa16fa52dd3f4e57b134d2398782606abdba5c243a0fba3af9fa09cbf2074294346fb17061ba62d41e801b5eb5b4d01117bacbd8e7216d41b70227427f4e6643cb9bb9b5bf58cddd552fd14d44bbe98d68bf", 0x7f, 0x80}, {&(0x7f0000000200)="2b2ecdd88411030cf9cd5408ec6202478939eadd7ee524ca3ef45295079163bcf052607428b692", 0x27}], 0x48, &(0x7f0000000400)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@nodiscard='nodiscard'}, {@mblk_io_submit='mblk_io_submit'}, {@bsdgroups='bsdgroups'}, {@usrjquota='usrjquota='}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@subj_role={'subj_role', 0x3d, '/dev/ashmem\x00'}}, {@measure='measure'}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'keyringGPL'}}, {@fowner_gt={'fowner>', r1}}, {@uid_gt={'uid>', r2}}]}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) [ 283.800609] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:59:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x401, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000540)={@empty, 0x0}, &(0x7f0000000580)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000005c0)={@mcast1, 0x6d, r2}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) 13:59:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x880000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x8042, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) 13:59:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x3, 0x0, 0x256, &(0x7f0000000040)}) 13:59:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socket$inet6(0xa, 0x3, 0x6) close(r0) 13:59:09 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) r1 = dup(r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x10, 0x2, 0x3}}, 0x14) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) syncfs(r0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) 13:59:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000240)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x121) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x4, 0x800000000000015, r0, 0x4c) close(r0) 13:59:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x100000200508ffd, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000015c0)=0x2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r1, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000001440)=0x200, 0x4) io_setup(0x8, &(0x7f0000000000)=0x0) mlockall(0x2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x8000, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000001480)={0x26c, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e24, @broadcast}}}, 0x108) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000001600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000400c1004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x100000000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x3e}, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) timer_create(0x2, &(0x7f0000001380)={0x0, 0x10, 0x6, @thr={&(0x7f0000000300)="0a39ad59c779a879206f4db6681f48e11bebbccc85759f08414c1afa9ce8ff35b7183dd8d6b8be6795b8523dd13aee066c96c33616e3b97ec09ddd19dc38032a76531688e15bb7c09c319d36ced39fcdbdc7de01add416e63deeadd2ec1da502de2524c8e22003d899440c0b7f3ae75ce2aba9d82e7b5dcbb6148e9aab34bd12ec60945a3a4ae09053257982c40a1535e0a1e52889c725723dd64ecd7db48b35f09e8588497f6f90b9b8bf79a0614d8bcc8a1e15b032dd8363f0e95991d78350ee880f11a066fc3eb17709f5ad8ea33163d2dd1cd98a4ab1be0d5f625280c95162167a2d120d5f55b12487c02fb05260588c5827d90b063ffa481fbc97a2965454da8f91711ae7f01b6b2cffd91c0c58c71211d4a7f2d498334d08a927b65f5c3b07075fd1226d004ae53015f3cadf84b420bba3d3badf1312cbdbe94498d250ea331c382e5f337f36e0767af04d212f24e808dd418dcc66d6d2e44ae42bca42425a541f2122af186763c693cbfb13db9070bb4f8bbf672d85aef7d21f197534892ec0b8793f36ad4f525e3a4a9b43bdac6097d917a709d2e03242174f583f5bb37691ffe24acb0565d6c87169b5a1a917244c36dab0b7f93bf01979449e8d436593a1dfa7a300d0a3bbe41bee6144967f05f6bf377bfac9e956e7e439952a8a2dfdf3e5d9cb69bd89cd0c38c65c429afe664ef691a9f9c30c3e62e5c63243f1a2ef5766391e79a4934c489382f63fbeef3dc46351ace1d4bf93ef47f0b68395a3eb744c8b2e277e6d2bf92623bed71c4d35eb9ac9d6614a23bbfd569a61af8b2a29991298ef1129c1ffd738ff0b21428920c1943bd8034771b4af006750ba2c69d242cf56e906edd624894d692d0de62efe27da94c12bf064815e637cca31caf3ce4891074a27fde5d8ecc90d0d1fe2cb4d64d69c33bef74b2c6b3b724dc6ba10c3e97935ce68a5047e6911eaef26fd2292773fd4f93109f412a8b48e0eb880cf3bed2e57dd88513d47fc98b42bfa70ee0f6cd05a046eb7e532558f50ab7431f61460300a180c4def62d9acee4fcb0a2b12257cadff3da694d79b89ec5191323983ee9775013ab37bccb7034613be107cc004089817a1dd957ca5da6a06472e46ff4f65ca4dea924bc9889dd694e7e76781074ed7d5e0e58ccc8e4ca7ec103933c762fea8282b136faa7b2c06ecc207178350731e9f2f0b71e1bb6eda965f751c18b232ae22c91eb29db4881d74a8823e7aa6eac22b823a3adecdb004c88a48ee365df8fc01c176d69597512d5c4ee5ebae721b4be65d3ac9c1c23061e05e0a15e7859236cfb2f4d8c2a75c88947deaa218a02a0602353e78e9c84e3cb532685877b199628411986dbaa674b0a2e948f08a8a79eebe0b0eff351a1bb22a60849eaec8e60f90b2be09436c9f2b936920928eee77d813eaed80327a28042eaa7e81bd1208c67904a27d5d48043f8efba85786bac9482dfa75a49546fca2d45623a31da0acab99e745987a98943baf9cc6343cbe87e0c417d4e832adc233001e15e45a66e119409369b3980454a8e9870fa082bef3a7a1ec3852d290415f49de64f66fe98a919843c257ba753e651a544fb3e17b04de90f689b2a1e4a53fa1094c6db2c73119e9a9ef663405f06fdbe5d77dd9d027cf5e4ce431d3eb31b2dce7790e84c10a0b5d101f3aa0f9c23b8322e72bd67bc16a391723a987c20eac43c0e7bce5e8f6140def0b620136317b499b60677f51455b8d747519cc1d233ee16cdd16391c92c316bcf1e7ebfe2729d20d2cd102856419cd88feea757edeedf14d79e37b07234640b8ef6be94364182b2bcd11f9fce601f883f9b52512d713f70ecae344b411a6d17e37bda02dfa289c4445330fedfab11a50cd77ee09e840b0e092db946cc89fed110737c1de9b12fe0a4a270ad614e056e727414e22f1a6391cc0928f1a33f5e255680409d5d7541d5a5a25fb7782a13375d93ffd94e044ad489a4f02464552c92341523b3eba3a278871cd74019e06f9cf36bbf481acdd8015199fe0d77850fb71bc8fad00f11e75e4fffc5ff7dfaa3a688101f60fd4599bf83fffde092ae33457c9c05d0fe08254c5ff6163cfaa2196472aea30b23afa05918a97c4784e471c044b0bb11d4b7f8dc7578b88556879215085b2aa1b600888dc23135795bb34cbc160c091d107736bdcf09283a60d267b7f30d833377f1a4a938345c3925e6b1390f0b35c99c279fc3fff556dbda3d0b1e07e6cd7bce0258821e2f4fbf5fd8b64d85a10e38e357ca9d07221c90c44db8ada9139b1eae3cabd7d8c083a129d8de5f964858953617fa1e273464d586261ef57f9fd4a0577abab41fd78c5a7231b89780e53d891d08fe1747cd70d89260a699d0b7400fd71ba593c6dcb34561ade9a6382cec0482996648fb59b5dd47f1a3c33c48e20ee5f3bfdd9da6fe6e98978eefdc03c763474eeadebac207be2e8bbd9bd096ba5034f818ca133b22894e994cb85ad5eef212116e0dd0f6367ec47ac9301351ef6e3d0286706d5dc4c9360c589408a26ac6c57e32a6f08f98f1800f44bef6be783a07d4a345298d67b7aba1b1586e2320f65b3c8b6abfa029609edece089aabcd17fd8a4e6da553871ff81b98ca2c76a6bffe6b232b5f3e5795f0fca1362c3cf8fc27c27c923b4ee28ed53859479467b7c16020ef58a8e850421149510deaf8a976166588e6cc5b8fb5efe33e026159a2b452d14f0f1740d66bf593d6c56f0fc5dc1d18070734f1144d628141c71d4cd539b1070c5a46477a2483671c5c1a4d1f1b1ee63b2252244b591c9616fa438cd64f7437c9557ffd5e6688abceec73cbdd057792136483aae66c135b1de1b0f44aa603d7709fd6fa8b3c79be2630141a1e09cfea22bf97cef3be03c421e4f91e31fe801460c670334d42c3d9b2d0b42803581c5f3dc6a6ee703b9fc344c15b0c8f76323d21033b4fca5259b50623f7012e44a60b85a4042bf7ae4500af02b945bda1cfe666b3e65dd8dd979a20912557186cb086e8f55c84a7b3594da8c742355a09736e703bab538943613ce05c55279b3fc304da278d05118638c272601920b235adb63978dc132769f2fb0135e93ec560b6bb635d3e56f03634bbe16c667d48a933d7b50e294191d88b2b3efadaa86b83765cded51ac9f8a3fd61c6a29472e2452319045266c6f9d17f2b8b969a283d3dba3efbe93d0c57d09841435fc1b154ea0e65a95b32048388dcb9f4fea900f421b1b96b377c9a3fecda53546e6cf02ea0a336331e095dac4bbfa7876e2deb1d17e24fe1fe6d6e91e5da52b98ed47b9b5aa7073de888aeacaec74d5f1558055cb47e4af7444e5dd908fb966d60f9e6033066041956aa4a9acc291e40c264a8b3eab45666c411ab270ee9e02e3943802ddddae33dd984f57637b2adfcaf75ca7f51ee16a3a9c9031b24e512955e7f762df66c4e7f89d7a675a06506cb0d1be638afcffc13dedc63232f758bc53dbc9feec3cbe9e6b29b95fcf122d5f20da95f79706ba069e05d1bd06710e472d3529279dbb465b587bd7b1c09fd5e7fa19b4de908aabc0fd0bdf68ce9b4bd2dfce03cdc801f094e132a13684d647f06a26f979d6202056cee5c4641e61a2e71024b7e3ab528be03a18ef6bec353f6bf7eab7c1b4d96de58953254a6c8d1c6a1daeaf42a915fbba561fbcbc52a91a93f2d5aa17102ecca7bc1837f0abff9d52f1019a2ab509beeeade3ec99a42c711d6818b17efd32a88c3a125ae089e804af349d09697340f151cd7076eedfad89cc0d25146e83a3d08a9d4c7f53115faf76f47ac0540a19f0f29eee9836564e9fb468c6fadcad3f1f1f273a5df54cab104098452d988089626b00a3cb530cab9962cea84c4fc9f4aa4df33474349464edbad3442f368ecdeebdc1543d65f41a3f130c80afdc23cd08e8d328cdef144dc6fce98d25d7396bee434ebe3e5507fe4c5f3173ba5ad934b72667c6a2a599d0945eb7d2fa840c139b713963fee2edd0149195baaa701b111f7932e7b77aabc351a9953e19dc13e669b30cf5c3c2625e46d5d4bf31831d4d05b94d26e439c6d7bd4f900eeaf9b8f789615adc60707e769eed3d8110dc46d0a072667787eb674a61b804371a9b883095d96dd0ed1e9b84617a91124fdbe7973e1138a35a944c84d822ba54deca18f316af132736493f8635a1cc75cf8c9befc9643684cc29c510b576c306272de20e80b589cce409b7dd8f1d66e2d06c44c5efcfac1b553b41aaae7cf607ab2a2d782788e6438cd7afbe43b7b130eb2554703728595185efb4454395fb04e28e43e8b500864e8f28f564b977cda7f0afd4382d2b3014f1704d60ba9f3bfa71a79697d2234f202572b8c72fb5394cc9918bc61a39760b210553fb1742c7bee1482b616c78f50998781981ab4cc3491da967bfa667beeb5e925eae3126a3d78dfa840ee1e6ecef5d69100ec828758987c019d84d58471e407ed1205dae11f565bc2fd2b1db8b55e27320a6b559a2bbf8cf74f6161e2d921a59abb8ef7e294154f9f1e3519530f460ac3e6618cbf7646ceff9e49bd2c74b18e149ddd926a266a085955ade7647231d7055372e1d8e7585245f8b9abbc8e3ac6ef1bc8cc3bb6f4b43ac3516bd40230a34e9cb76bba20b752fcefe03c5d465969e375f3538317284f63f4462d517f287dc3d53f9ab5cf5e08fce6307dc3be343dbd406a551bcfa40703937a42dcefb68fe1ce6c2894887493b9c41e5c558c354bad6a68103fa6982575f7984db8eb370151f930f24c2779b0515344a3fa0c3f9adc5e07d94dae92157145502f426fd416590aa0e62995e31662e3c3449ad8e94f639a56d7ffa700d93d4b44a87bb45012e4fe6b2f269bc6580cd4f4be4c242cf8e3772504a98bc980cb5deaa2214f0557db7f28ec33e5ac47246f69d9fbc152d2784fbb5a8d9e25e24e68246f5af28bb9658e7ca16a7b343e75635cc44edcf0e85bab7ef3254a9100e55f564078bb50148f253371ed50b4b32dbeb464f619ab856b9c2ed301081d68d23e4ad17ec0bafd6246c0001ae01fe20e608a99859e31b4cecf2c9bdb28322c39e4e1891a81fedfbb864230c348c668435290750482337aaa8ca63b991f3b277b4c4c9cc09e49b04781a5d3333e58fd6c797a2dd2c13a3245b63280a28a406dfedcb35d18e30ebee127f574a3bca98f59041803309176d8ec54b4a495d0b06c8fe005f8369d2014dbe695aa6cbc3029859eeeec092dc4b552a672879b14b0491e23ac741ee5abbe80fe2bf1493b565ffcb5b45690e7282b42be918319bcb55488028dd898f197e3d354c242b3260a377fd34da8d14f0a78cb7b596db0b0c6f73b90810579ad0422f2b701092ed4d7885046b14929aa60ead00e2d1605f2a043c162d807743c147f6bcd18de5957c70cf72beb7746205edf8b3fd93a2684e87937ac47ff1bb775370831a10583238a7824e380ae074558edfb74527de7c7fd012ba4ce64774525820751f8605c506238075b8899d31a082d363ad528fa6b7dcce1b2a6db9d0b3efe178540f84ff0934d442f5a770b4d20bc0f4b7d113447c3bd22d346e4f2f72158a7488d492d1a647a209e4c6b847be8cd7f3406c550f4e1b6112dec97c7403f16be83a8beaf04d501ac52d7a6804e70880c88c7799fdb50d7954ce506b664fd7135e394bb290cd328384b4718a182410b8e2a3cb1e9c40f4772c47bc96d3161ef67369a80098718d3cc205edd39a695f7aa17cbaa84e865a2e63af8e2883f024c6a08ea510bb249c4a32b3cd3c8c70e8", &(0x7f0000001300)="7a67c8f4a15652b8b3679d1d9c45e07d143a55ab35dec946096dc0cafc0e28734c65024346fd78b3409695769d8032ef63fde9c7b2abfe019b48e12ca811e3635096869b94466522cf76a9e176a74064af0091a4d7c2d6c4c3c79ceb00dcd44212c20822ccd2235a865090a2cdc42418c305"}}, &(0x7f00000013c0)=0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f00000002c0)='vcan0\x00') timer_gettime(r5, &(0x7f0000001400)) io_destroy(r2) 13:59:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) write$binfmt_script(r0, &(0x7f0000001180)={'#! ', './file0', [{0x20, '/dev/ashmem\x00'}, {0x20, '/dev/ashmem\x00'}, {0x20, 'proc/}('}, {0x20, '/dev/ashmem\x00'}, {0x20, '/}bdev!nodev$user'}, {}, {0x20, '!'}], 0xa, "53693a6a3b23bb8a071950aeb16c89229f0543b50d46e5dc10c873a71c3a04bb3af94b94912a"}, 0x75) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x200, &(0x7f0000000000)="07909c9704f541ee8c5c93df23b2d9b01964fda6bb8a5d098287a13aa88f00b1f278ab8a2191f24e3633f9aa4682b8e551ac8d5c5ff2640eeeab824fd7adcd1890c3b9619efc7ca41d803e801891d9008307f7999e123ea8d9238d412821d11f333c04ab62404ba690494ed604ac8980d9e21e39d43999e95a154d38b9528202b3771d9a71d9f2ec54d3f7cd75868fcfb84f517f3576011298eda1bf8e32695d4b3b48bf37", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)="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") close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001200)='/proc/self/net/pfkey\x00', 0x2280, 0x0) getsockname$packet(r1, &(0x7f0000001240), &(0x7f0000001280)=0x14) 13:59:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x141) sysinfo(&(0x7f00000000c0)=""/154) poll(&(0x7f0000000040)=[{r0, 0x8}, {r0, 0x11}, {r0, 0x1400}, {r0, 0x8440}, {r0}, {r0, 0x500}, {r0, 0x104}, {r0, 0x4000}], 0x8, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1f) ioctl$sock_ifreq(r1, 0x89ff, &(0x7f0000000000)={'vcan0\x00', @ifru_hwaddr=@dev={[], 0x11}}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r1) writev(r1, &(0x7f00000013c0)=[{&(0x7f0000000140)="3b81394725894b73cae1911462a794e1ce5301735ca0f6b38b28ec5fa216de0504755d9e8e02297b02ee1fe9ca10f08de0307e6e3b42ffa15afe364ae3234aa366ed1bce760d826f0fc19c8e3a4a55b1ff7e5eeb39b64427f131d543abe6568b91049ee1984d0eb549afad93e2e8be94aa228e2c41d630067ce8fd5b5972ec31a00f6860a3a05482f26eaca0988606e156197b9555c1e6e01d8e0a01dea545fd6d84205748e1bb31dd8b3aa44a46d4c3139776588790022aba5503a04471ecb013bc0cfb95aa0f1f1761cf9284c7ab82400585ed1144b4521bf9635e34c5db099fd14947dbff696cb74f707c2522d4c254a8bfd649c386121aa03abad1fc2f14576660dd5b9570f069eda975ab14b042f7a1cf81a79f330cdb3d4b76558ee517582f793b263717e223ac4237308a2294b4c9600d1ccce88bb534fff9d1b5686d622ca8667e10a1adcdfc2c99fb8e476e6f010ace9b8f08768ebd70a23d94bab383c9630606f7d0a68c7c20d7cbc000ce16c190c714b5343239b99d2d278b1d037d05a80a5bf5f6f20490ee9fccd1d015e1431c0a08dccbbad0bdeb21187f4c79c704413a38c99f23296a08b528fb8d1bb3a3f4d5a9c0da21729ea6ca0f053c508a9995917d78f1e5a1173dd92b8c3e941438095e39130d5f573db538cdef03ce3eca0d9e3ec0f620db3e9868a2e9d321ef7ce111bb821ba370728a69c8b9b3fe6678835e250b981386e27ad6b95c2882c82d85ddd3cfa3d054e482b72822aa2d6caf32e1cd9ef246530c7f882f9b6822061e789665bceb2a0ee290ad812b3f48cfe19e71aee20754fd364754794d322ea147ebc4e72f773bb98275a42ec9a282efa8492f57e602d3581fd1d249d2768806843dbfa7fcaa5bcf78dcc3edaac60444735f1ec93d30372058a3673d1719fd34fb74e44d5a9650f13adad2c216753602fc1192188a4cda7b6d4b256c6e304bf726f07bf17df09155ffadb39c7f871e1f52858c22b77623d01f3188b3ce9ae77319c6d667ad7f6dce9f73974c17bddfa47c98acff8e96ffce03de4dbfd3d159e7b960625f24a013afe53f770ee7e641a610d32af377b4f82eab16d4af9c7dc696dcd00aee273652688982bf48a50c3c3ed5291b87e2eeba312376067fd3a5ea33f19c442581f00e3fb66bb34e0aa507f450665395ce29a27a7f5eb5cf55ee94f08fb7e73434f421f438f01951a86189940125465a5820e02862f821b9de0b9a23bf29f0ce8bf2dd10a39626612fe9cfb780c063f7bedfcd0811b00c4e0f3e7acea4807bebb2c9e56b1f52741ca6857c2add62f2f4ef08644d1dd4d6600985e4380ccbac212000db97ec0f88ba2622b4155a2df672c1237d0d76d679749c4e9ddfaf19994157e9afdd6d4c5914d0d217ec1b2422cc5e9f84febd3e40681d2c9e22c087a089ca4967bdb925f6cc0b4c995e29f4982bff47ca7db79b68739c029ae59ae57debcd982697d57526daeced07602b6d4d83e00dd86aa663ad4b873a21744733622f954245f8e75c44f682a2e3b54190db041ba1cc4cd81f0d9c222c9484d56221d6b1729a1504e8276f8254540d73edddf3cc487a036f0ea9757a2b2ab71adff816fd2874c4aa1a2043630c774956a0f68ec1d146ea902cc5c2c952efed30162520e2e9edb098bf32388e570d5c6c162f5ef206c61bb374cbc14ed426c316a24a226b2ac1e7c2c2029f038b748c813b239324f358fb69bf595b30af28395219d4f31d1df3f5ea3ac3233aa192113fcee3d7718e0a0880d58a712ece06136100717d63af90bed98f0157de532e9b34539f2ad6a5c5d408df9165fd5743bf4fa4e6151c909dc92b6b37e7fbba22ec6b26083561f06846c95e28f474d360212602d5fb034ddb77de3db0c50966df9e0df432f0c5951049d6341b17c7dc8a9d15a4efffa52f50b18b4f2ef58363d2a4570055998aa9a1452cd898c3ec49ea31dd7edc042a1fb104862e574f82b669ffe03567da04b75a973bb199f4e94d4069e69bc6787fcf10fc56437bd067d146405384acf44a85636c0f4e8e872622489d14544a645314fbff0cccc57423d86928e95cfca2424c5224dfe37be0ab9daf34b6710aae850204fc918f218944ff67a9f9b61093d2eb2504a6f788d361b5703792baba96a056fa2a5af4f130f6aaf8e37653f46186c8fcae92aff00adcc28c3b66e175c02bb23db1e49199b887b26c9ded4517a739999e14a0a4dfd435999ad20605675f1f11ced6922272f9c68cc07c4549ce349b874c98b61ea6cdf1a7899f26ae7efd392c52ca6ecd012763613ab492adcfef476fad084df4c3caf81d496c8ad5ec2231b14176ba52b385b0f4a9159e2b02bc12028a57673379de8aa32bb0334265fc1c4ab041f37fa71b96cd0281f9c1a0e2194b1be81c63e09dfcfc551ca2755a5d67e49a685536be11dc7b2fbc8bf14817adcd186a0eb541409f4e8f8307e172f9cbb611fd3f0027dfed22e706d5ad00cb7fcbed94285751eadb34ed97c01fd6f37dc09cbec4d830162b6f11dd4dc219ac9d6772ad9e26b640051d6e0e85c075608b48afbe71954ef396514f0e77897499b484ada6713eecca67b0ebbfb7c23935c52c8f894e64c71a76c8aad9a0e9dcd9ed29194eab1c94a1c7cda0217cb7c732e32b462528b77584212042bef3c6d954a3fe015ba9ff32ff7ea7208a5878c2ec7fe439d87384dbbe851a0ab493920a4e139af80ad4e34727591015d0177426060aed7a699517f98244694238a566332a922d9386760f976ff7216b1725e9c145116afda7384a586401cfa1ad1df70ee507082ac641eefaaa5ac6ac0d3a67f672365ed29e986505c3f6084d70b96ebb77b1254e4daed8f4102c2d8ccda19b25809a90c843d8a328b9bc2174401b6c142078e12dac0c53605639730c263198266cc198667e79649ad9186e46576b8162b8addd6c8fa1ed76f991468506808137fa9cb8803f3692c731cace59e475c8550c20ea313580d63728d0e6ff3c945a7f7d2fe85473429d4d8a4cc0b0167571184dfadfdad9d519c25246ad5ca99f68860406e1b0e5ec42b8bab1eb450ecf7020fc861ef8d97c535811571fec10b9fbf1295fe1708a2d47dc0db3198d5b19e6a8c18e568631883be5ea2ace0868e723636d57e5f702537836fbd032d5fdc4f5d808b4bf724a9bfb1551824a3c2b82091a3f97487fe419f473aa9f04db4b393d230875c0b539d212438f6722b980b31e6bd8c1616742cd56f48bde2faf858f427e3fcbb678e5a7b94124b5123e17b576c97b05134982e2ca643cd1692f97177aafd33ad9027434baa53a28a8f24d38de7b2e6fbfdbac8fc8cc631c784d5ab4804db6c6894da997887da365b76619044cbbd3ccbda9f50eb0ed6397e2c34cfead071ce5a295f29af9dd53a8bacf36d6ebd2a395aa9d4b6e240d59a396bcd33214023a89b4882223d90d1f6a9caafcd109a5e52815a7473d446dced902f88df996d4df53792f1ca7c1e9a4da533b0912e0198bedd57caee9fdbf060b6d8cfc2ec077076c5840a1018677b5a2f1bc2e7687e258eded97e5cf77b99a6b8cffcfbd8c582dd98f5354c8601bccbbb5d4f3bf5f442df6ef2a4a51cb9588f8a95b5fe6e649fd0655e7de5164c5ecad4946d56f518790aac95db12f001d42f456bf5b0ec35bd0842fda8a70dc75bf027d776aff0dece5320c779bd9397e9c437518acbcf4562c53bd0c898584d9f891a946eff6da00e8468fcc254dbf413ac5daf78285186d34b4fa69b6486e0727d6a408f5e4251ac9b54b200e5734d3f6c1ee123bb839a37f8102393f38e41d9e9f289d3c55690e9ef309f3beb4eb0ad7eec48120c42715c6d05a4b281e756c3eb4d83e8ce8791404c7a7ec72b9f44c35648b6ab07b2a2e146bc8ae51c8ab5006b467162c64b4c57ee91d3d2de3b94029a0e8008c9f96846876e6c71439278811b9589cb9cbafb6b80f4a19819ca56ecfe54810edda6821d2847c20b28537b5c056011142824a54a1e2fe573b56885f951e82470bcb47593b4f1c14f9ac45519f8d308142642903f2180314f47ee48715c3dec8b0a8231661a6e84649ae1dc9e5befdf6cbcb28cd178dba00d9df7910b727412ed6317419cc9ebf7473de8ee4f64c03f1adf84f947347fd7d4b80adaad891063c1f6f93f954a2b7c054c9fc6ffb9fb43c4a193367123e5caec90805483a16ed8351bda320d52740b38a46328e708e54dd866d80fae283794f59d80cd8042078253d3af096f9a65c9a866b9748f4ef34c2419b4ecdc3be09141d75d505f39c703a494066ef4e32713f6106f1d9aac64be4d195447bad7d1e2d0458a7f66213b2e5964f9f8e09313f66c143854a4922205222cef4f40fa7012b09b0453dc12ee3fd3f03fa52c0f9239f59c1ce3d0187dbb1bd93ada04629e602e37066e0bc2c8dff3fcfbd56dd816c57dd5499b042ca97d28810ec500c51d032981543a5c18f195cddb21426d36d7598523da465bd016e169d27b804c496fc71a473fcd1d84d0c5e0071531f18a22288ee28f66cad5608703b2d5b792b6119539a8e4898b271b760f83f6f60bbd04be5334de1fedae35cdc7a2bbe8b6764f3650149886c534a86d7639edab4aedcec2f98c8e033aea8286d096354b94b45c76bf1bb3f8d09e3026f7b7b3ecd4ec5f8484d029373a41c39ad90b34f04e2582630f34c11c8c76e486ca9f8ab0b4c07c9464b7ac5e5ab3a523ecd1063a456b01db11fb68fbaafd58dd1cd4cfc085fd75652f3b5004bf228450f62f4c8783bdd3750831301f7deea876850541716172df0fb3b0bf9779915c946cbee857565279bedf482c368968adb85acf131bed5897282b8cfcb04fcc3a05cde2807b609d1c4b1efda9c3a84404879e2e580f453e0aaf51de9c49b5f08cf4ec3297446381bb71606d2af0c308c1fb8185e44bd2013a76301b7572e57af68832b210c87ee76d024c5ad5e99251b12320def458b2927d86744902e7fb8563c34cfb2334efbac5938b04573b9c4b5e448dc9d5da85b03061c35ee2a3a2cbe1f4d89aee3510cab73c151524bce8992a08b6a33d3242b220bb07626da82571c4cced929f28d8fc557231f5752c90523609078bea75d4bb24aa41db6fe84aae398ce6c1b19c0c668ec73c8c8baf3e863638e50c8e316abac1c995774ecacbe2ace58fe95d0c494355af554e2015b8b4bfa5f956b7c8fa6a58d5d3079cd0d8bb7dcfd54a0e54165d6b57c33fe0c8c32dfc1e05fd97bc7b02c711e72bd189ec260f1060d8f86c71d3ae38e6684c981c7ec080e1e808052c8a473946ba082f2d7c75ea8c805af510ff1463f79455d19bd700c46364047e0f4640f22616a131b9b9432b05ac5f3092125987cdb406106ccc5b43da622d24bf01d344761a7b2200fcd252076381789097557a0aa7d87ddabe41e188cf80f9e225891a70f325025b2e66e1ab629be3b881f880dfaff922dccdef3b06db4dea16a7cf4efebff8b01722e9069f4cd77f3a3121e3c605c440868ac531349abe96885beb139765b3c5f102210f341a0ccc56ed1dc10e5683cb41a06967850a9a01ccc5d7ca66f19c8ac96dd8ac870f90fd23fc456ad13c0347ce21888aa4a51a94519bc29a9313349ffb477ef23d42752b7a5e77cf43174b5f78849c9425a24a59df40e361f995ffb63979032d3fda3f5e679649268172e09197cb24d0b9afac385db8174ff0e444959dd5ecdeb6e3df650b2b915fefdfea5985ce30e1495daba47eacc1bb6669fdcc10f9b1478661b690a67a7343b1911b3e2ac2f853e", 0x1000}, {&(0x7f0000001140)="379db1d9585802acde8d13684a399980fd14f27c56546dcc7640c4197b09fcb4e8626186cc9d287e4b840913c363a002d94dc3b5a5355eb850b656766c075176d2f6a92f532a8b9771c687fadcc22cfdf613f97f028bc22ac6f1b0ad7b2615c4f8e87a825336c0ea94d167d570a2433730e123809bfdc1e3cdcff66d038717575b858a6974641145de607ae7f4c664116fae0530f172ec273162170540ecb83dfd63c281d3681d20742157a2c7d72be939d34f038a019bbb87af92f0c83f79329b8b07c1c3e1e43b95d059b0a1ac7f3c295b90fda7fd1bd07c399e3e2cc4ea05a67c23d787bc159d67f84eea1ba41ca2d782cd5a813a", 0xf6}, {&(0x7f0000000040)="ad18aa32f8e76d31afdb3b9fdb9c038aaa0bd84e432d0c0528e3f1529eb61c694f9a599e8a807a74612315dec06888670a73757341fd05d50efbde610dff2f4b103846b9e635ecf3f7820b164ce87fc81ddc76eda51eda7f484d4adad1b2694355e5a086d4d1ca1f4ea5a18f35dbe7dcad5fcb64a4e5504d1870877c53c9eeb772c517432480e4a1acd6136b9b89c255fc606061d0fe0afa6da4c6c9d1a819ad8bb38d", 0xa3}, {&(0x7f0000001240)="cd962e603ea64dae4b3753720b47e0b97daccf40d3673ca5d23b7bb7d0f3707847b59750f572a4c9475264395b61c24e4c7260e2b4d48315601eae5804fbf255c555e585392fda471b84f429c2135317a1aa8ef91708fb720c26b1c290453f4ab996e5b9ecf4e13693b834e0eca7d5eecde695424353cde5b5803df816724807b3e7879de30096e80ff9c71c85c8db81d12d2e772212dd6600e54b18870a4efb45efa129b14401e9c03ee724b0add44f", 0xb0}, {&(0x7f0000001300)="2bbd2528ffca2cf7a31bf5a79b56773122a6a2dc7d90f656bd2fd92054cfdf12cbfbf5fc025228a0c6dbd56059cdb3ae9e3d25a4d11472c185887ae3275a3265617b49ca53d979ac73cc68b346d101a39df8f155681ae034858f4f5d9ca7e190ae63ca6877753ce700ee325ca5b16627519409272739a4a250277336a8a829d917ebf23388971749d13de27819a9d2fcc95619e6c8f4c098954c", 0x9a}], 0x5) 13:59:10 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe4, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x440}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4e27}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40000}, 0x4000001) 13:59:10 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2000, 0x0) write$selinux_access(r1, &(0x7f0000000080)={'system_u:object_r:watchdog_device_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0xffffffff}, 0x4c) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:10 executing program 5: rt_sigsuspend(&(0x7f0000000000)={0x80}, 0x8) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffa) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x3) close(r0) 13:59:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'user.', '/dev/ashmem\x00'}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000080)=[{}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x73, r0, 0x0) 13:59:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fe) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e24, @multicast2}}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000100)) 13:59:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x5, 0x7fff, 0x5}) 13:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) socket$unix(0x1, 0x5, 0x0) 13:59:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000000)={0x8, 0x9b}) 13:59:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x44000) sysinfo(&(0x7f0000000040)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r2, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=""/51, 0x33, 0x0}}, 0x10) prctl$PR_GET_SECUREBITS(0x1b) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r3, 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:11 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) 13:59:11 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x480000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) pselect6(0x40, &(0x7f0000000000)={0x6, 0x4c, 0x800, 0x4, 0x1f, 0x3, 0x100000001, 0x6176}, &(0x7f0000000040)={0x401, 0x2, 0x400, 0x10001, 0x2, 0x2, 0x9, 0x6}, &(0x7f0000000080)={0x1, 0x1, 0x5, 0x4, 0x6, 0x7, 0x4, 0x3ff}, &(0x7f00000000c0), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 13:59:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7ffffffc) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) fcntl$setpipe(r0, 0x407, 0xfff) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180), 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xae, 0x17, &(0x7f0000000040)="f80b4f7cbae2ec5ca3b2f029253fe0ca4d0c208cf3708beac2e9b45073c37c457c7bed7c2ea10a20ec67ef258b5fda7f3afa77fbf03e472080958489ae07cfd65225a55b357cac8a96a21d4b57d643524a08091c1e436457e6b991747720724726e525339b26fa2c7e99d2c22aedfab50757b515f83f457af3fb71de0b126255d861f5fec2df79d55714e8a2b2d0d58887c3262f708ec14758c8c224f23aee0e0778076470719fd58da6fc17f03a", &(0x7f0000000100)=""/23, 0x10000}, 0x28) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000001c0)=0x6, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x40000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, r1}) timer_create(0x4, &(0x7f0000000300)={0x0, 0x3d, 0x2, @thr={&(0x7f0000000140)="6d4e423a65d69b281c3f220b2d68f2affc1679383b2bc7f7a8263b87225e6ab575232189181755d00560d10234e412044a5cb513bef023b57e7395a0c7fb7513997118080ddd05f73cf590544734b5022df5ae2cb8f107cec08127399bf878f4e97788c5ece560a16814d472bae887a032f23478744f4dafb67c354eda55708a074411e654b184b7b56fb4e891dce0aa0502762389220d2ba23864243ccfa320ccded99def19af6635db4a9e305f9df9b20dc17ca288e1b733c9cd8f7050ee38f3ba88fe852341", &(0x7f0000000240)="bc12522e59c0be2ba94890de2c352b0b5ed021a1b48753dc09e52e7659f9c513e9341637631fd2442beb9cfa6d6da2c5987f28e04c27e7f76d5a3521bb166e389661a2f9fd85b4071134bf96e512ad61203e7192b28ab545612c19627918fda6046301f0579deba94f487aebdf13cdb04d4726c1526896a1054a543fe0518c490c57cc5171ade48bcf3cbbae5c611ab03be9"}}, &(0x7f0000000340)=0x0) r3 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x100) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f00000003c0)={{0x77359400}, {r4, r5+10000000}}, &(0x7f0000000400)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'team_slave_0\x00'}) close(r0) 13:59:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='/dev/ashmem\x00', 0xc, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x80, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000300)={0x5, 0x5, 0x1}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000002c0)={'veth1\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000240)={&(0x7f0000000040), 0x1, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES64=r3, @ANYBLOB="1c1a0750f028ef2f4c5af373b4", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRES16, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYBLOB="8aded3907a84da4e6eca664b562f95e1948532491416", @ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRES64=r2, @ANYRESOCT=0x0, @ANYRESOCT=r3]]], 0x3}, 0x1, 0x0, 0x0, 0x4003ffe}, 0x5) close(r0) 13:59:12 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xfffffffffffffffc, 0x2) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000140)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x7, 0x3f, 0x78, &(0x7f00000002c0)="4ed76116f31183c0a35bb9a0cd36bfe480d192b6ac11b1c667f60fba6547c8cddb2eff0d3ac350369c9b54c2e37b37bbb6a6a0dab41895d9e928db5a185a2fa4af0859380b4735b6c432d699ba33ecbe3d3708fcdf88a2ba41528e9a7e607a81dfcd3add59a0a63e7a9cbae9c4c9b92bac53810c1b234775"}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) read(r1, &(0x7f0000000080)=""/29, 0x2f7) 13:59:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 13:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) 13:59:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='*\x00') r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getaddr={0x78, 0x16, 0x1, 0x70bd28, 0x25dfdbfe, {0xa, 0x8, 0x318, 0xfd, r2}, [@IFA_FLAGS={0x8, 0x8, 0x30}, @IFA_CACHEINFO={0x14, 0x6, {0x6, 0x10000, 0x0, 0x8}}, @IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14}, @IFA_FLAGS={0x8, 0x8, 0x2}, @IFA_CACHEINFO={0x14, 0x6, {0x245761e0, 0x3, 0x5, 0x7fff}}]}, 0x78}, 0x1, 0x0, 0x0, 0x200000c1}, 0x4044080) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x33030, r0, 0x0) 13:59:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000040)=0x1c, 0x800) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) close(r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x7}, 0x28, 0x3) 13:59:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) syncfs(r0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) r1 = socket$netlink(0x10, 0x3, 0x3) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00072cbd7000fedbdf25010000000073f354aa1ef553064c0018000000066574680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x801}, 0x4000001) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r3, 0x4, 0x1}, 0x14) 13:59:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x27, &(0x7f0000000140)=""/4096, &(0x7f0000000040)=0x1000) close(r0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000001140)=""/217, &(0x7f0000000080)=0xd9) 13:59:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000240)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 13:59:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:13 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x90000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x7ff, 0x1, 0x3fffc00000, 0x7, 0x7, 0x0, 0x200, 0x40b, 0x20, 0xf60f, 0x2, 0x6f8}) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000100)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x6, 0x0, &(0x7f0000000800)}) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x6) 13:59:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x242f730d) socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x800001000001, 0x80011, r0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 13:59:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000240)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 13:59:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x5, 0x4}, {0x6, 0x3}], r1}, 0x18, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x200000007, 0xa65e, 0x7359a129, 0x1, 0xffff, 0x1}) 13:59:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10140, 0x18) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) 13:59:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) tkill(r0, 0x16) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x38}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) 13:59:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x121180, 0x10) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000080)) 13:59:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:14 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f0000000000)=""/11, 0x1049a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)) 13:59:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7fff) ioctl$VT_WAITACTIVE(r2, 0x5607) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x30000, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000100)) 13:59:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000080)={0x95a2, 0x1, 0xfff, 0x7}) r3 = memfd_create(&(0x7f0000000000)='#vmnet1nodevem1\x00\x98;\xe2h\xe5\xb2*\xb9n@Pq\xbc\xa9bHoR\xfee\xc7pf\xe9\xed.\xc2\x97', 0x0) write(r3, &(0x7f0000000200)="6f12f9eb9e69e4aeb9d9c0fe704943d2f83615fa56e65288075e3d7e7e4d89c17e504e3a28dff89ff9961bfc5032", 0x2e) sendfile(r3, r3, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r3, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) accept$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000400)={@remote, 0x76, r5}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_int(r3, 0x29, 0x3e, &(0x7f00000000c0)=0x1f5b, 0x4) select(0x40, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000540)={0x0, 0x7530}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x19, &(0x7f0000000240)=ANY=[@ANYBLOB="850000002e00000064000000000000fdc5db6d14058ffdde00f84e648b6ecc466686a1d8e9a89609ef8ed4968a5543eea3c178d40bb36f8e5067462cc8cc665567db9c0ec51c0c3d8752aa08e8090000009d70a83a614bd2575785af9399e388c63add18d68efff503461dea1b6cbe1a65e790ce7d6c0dbd3e4f1765d2c9d91cfb7fb6f4e76b0951e71db8286b1ab116dd88d4cf1bcc78307f04e2aa411d32893d10f13cbec39ff50c042bb3d706dc34063100902d8c5a33756255d79d35f40000000000000000000000"], 0x0}, 0x48) 13:59:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x8001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000040)={0x535, 0x2, 0x0, [{0x3, 0x40, 0x1, 0x6, 0x6, 0x1000, 0x3}, {0x3f, 0x65f5, 0x1, 0x2, 0x800, 0x35, 0xe199}]}) 13:59:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = memfd_create(&(0x7f0000000380)='keyringlo\x00\xf9\xe32\x10\xd4w\xf0\xfb\xca\x82\xbf\xc2K\x1c\x95\xaaPv\xben\x8b\xd7\xaf\fn\xdd\xf0\x18\'\"\xfe\xff+\x9a\x00\xce\xf0\xfbi\x84\xe5``\xde\xb0\x90\x81]\x9e\xf9\xfb\xc9\xfe\xbc\xd2e}\x98\x06_c\x0f\x14\xbc\xe0\xd3.,\x81\xa5\xbf4\xf6\x03D\xd5\xd1tU\xfd\x1b\x7f&`+t\xc3F<\x13\xbf\xbd\xc2c\xe8\xe6\xc0\xe4\xfd\xb0\xb3S\xd9n\x05\xf4\xaf\xda\xa5\xe9\xa21\x1e\v\x047\xb3\xd7yO\xd3>\xcc\x81\x1fm\xb8\x06\xdaT\xef+:\xc6l\xdbA\xbd\xb6B-8\x9e\xf5;\x01l\xb1\'\xcb\xae|ggX\xe1\x99u$\xeaoW\xfe\x8e1X\xa0\xb8\x939\xf5Mm\x86\xb3\xf1\xd5\xebN\x93.J\"\xb6\xda\r\x1d>\xaf\xf99\xd91 \x19\xfc\x98\x82\xc3{d\xcc?\xf3\xe0\x01(\x1cv#\xc8\x91\x16\xa7\xdd\x8a\xefj!\x10\xb5\xc8\"q}\x7f\x9d\x03\x01a(\xean\x95\xa6ok\xb4\x17X;\xf0\xddT\xd1\xcd\x01[0\xf2\x96\xd8\xf6\xe5\xeeC\x8b&|\xf4\x03\x9a\x90_j\x83\t\x92v\x96\xe6\xdc\xfb\xa6\x1b\x16\x10u\x85\xa2\xa1\x88\xba\x10\xeaWk\xd6\x99\xbc\x90x\xd3\xed\xec\xcf\xbd\xbf\xc5_C\xdd\x899\x9e\xd3XD\xe7{\xf9[\xa7\x9f\x17\xbb\x93\xbf\x85\xe1l\xf6*\x13\xb5,%\xc2R\xb7\xe4QO\x01\x1c\x9d\xa6\xb2\xcb\x7f\x19\b\xfeX\xceer\x16\xb2\xa5\x19\x0e\nrp\x99\xab\r\x83\xcc\xdd\xdb\xaag\x92\xf2\xbe\xbf\x9a\x8bqk=\xd8\x8d\x15\x90\xc1\xd4\xfc\xc1\xe8\x18\xdc\x822F\xd6\xd5\x9eD\x9f\xcf\xf4\x97\x0f\xf8\x88\xefc\xc1\'}v\xc8Y\xf6\xeb\xa0\x8c\x01=+\xba\ry\x18t\x03\xbf\xe4]\"\xa2\xb8\xdc\xb5\xffg\x9et\x81V\xc5{2e%os\x97\xf6\xc1\x8c\x91\"\xdb[\xdf\xb6pv\xee\x1a\x04\xdc\xcf\xd3&\x99\xaa\xd4q\x99\xbd\xe5\x05', 0x0) write$selinux_context(r1, &(0x7f0000000040)='system_u:object_r:devicekit_disk_exec_t:s0\x00', 0x2b) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x20000001, 0x11, r1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000000)) 13:59:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x400) fcntl$setstatus(r1, 0x4, 0x0) 13:59:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:17 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:17 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:18 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:18 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, 0x0) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(0x0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:19 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:20 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x7) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000700)=""/49, 0x31}, 0x8000}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe}}], 0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffddf, &(0x7f0000000980), 0x206, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fcntl$dupfd(r2, 0x406, r1) getdents(r2, &(0x7f0000000040)=""/46, 0x2e) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x9, 0x1, 0x1ff, 0x2, 0x0, 0xff, 0x40000, 0x0, 0xfffffffffffffe00, 0x100000001, 0xffffffffffffff81, 0x9, 0x0, 0x68, 0x3, 0x10001, 0x8, 0x9, 0x19a, 0x1c81, 0xffffffff, 0xfffffffffffffffb, 0xb48, 0xb69, 0x40, 0x6bd6, 0xbef4, 0xe0, 0x4, 0x7fffffff, 0x8, 0xfff, 0x6, 0x800, 0x0, 0x100000001, 0x0, 0x81, 0x4, @perf_config_ext={0x200000004000, 0x47d2}, 0x206, 0x4, 0x9, 0x3, 0xa9, 0xfffc000000000000, 0xfffffffffffffff8}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='(\x13selinux!self\x00', 0xffffffffffffffff) keyctl$clear(0x7, r4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x9, 0x0, 0x4, 0x10, r0, 0x2}, 0xffb5) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000002c0)='vlan0\x00') ioctl$ASHMEM_SET_SIZE(r7, 0x40087703, 0xffffffff7fffffff) ioctl(r0, 0x43, &(0x7f0000000780)="1c4de547b3ea0eb4bba79c65fdbc0988febfa7aec09e2036b0f5a4398376bbf20218941c26765c546ad2e743f5616b30980e902a823683fbda1c9e52f5f787c474ea912c25b7e0a8cd75087058b0b270b0b8235f21803ac5bafa7a52103b3b1e910b56c4920faea033ee96839b649b00fed089f5636d66932caa319187edeb6ac9c89e9996b884fe02f8e95e430adbf32af5ae3d580f6cefcf93e2e65cbc3d600be4d61f59375a2f74ffa4156ce5e80499283357874b48dda987074c9ff90b1f52476e9d7f0424ea86df7b1fdc552f358526fe9cfa2bf6428cb39b3e3c3d30fa6e") ioctl$ASHMEM_GET_SIZE(r7, 0x7704, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r7, 0x0) 13:59:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x18, 0x14, 0x109}, 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x4c) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000540)=""/169, &(0x7f0000000600)=0xa9) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000440)={0x8d, 0x7d, 0x1, {{0x0, 0x6c, 0x8d, 0xff, {0x40, 0x1}, 0x100000, 0x8, 0xa7, 0x190f, 0x27, 'nodev]posix_acl_access\'posix_acl_access', 0x0, '', 0xb, 'selfmd5sum@', 0x7, '&\'bdev('}, 0xc, '/dev/ashmem\x00', r4, r5, r6}}, 0x8d) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r3, 0x0) 13:59:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x18, 0x14, 0x109}, 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x4c) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000540)=""/169, &(0x7f0000000600)=0xa9) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000440)={0x8d, 0x7d, 0x1, {{0x0, 0x6c, 0x8d, 0xff, {0x40, 0x1}, 0x100000, 0x8, 0xa7, 0x190f, 0x27, 'nodev]posix_acl_access\'posix_acl_access', 0x0, '', 0xb, 'selfmd5sum@', 0x7, '&\'bdev('}, 0xc, '/dev/ashmem\x00', r4, r5, r6}}, 0x8d) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r3, 0x0) 13:59:21 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x18, 0x14, 0x109}, 0x18}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x8000, 0x4c) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000540)=""/169, &(0x7f0000000600)=0xa9) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000440)={0x8d, 0x7d, 0x1, {{0x0, 0x6c, 0x8d, 0xff, {0x40, 0x1}, 0x100000, 0x8, 0xa7, 0x190f, 0x27, 'nodev]posix_acl_access\'posix_acl_access', 0x0, '', 0xb, 'selfmd5sum@', 0x7, '&\'bdev('}, 0xc, '/dev/ashmem\x00', r4, r5, r6}}, 0x8d) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r3, 0x0) 13:59:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:21 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x4e6b) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x189001, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) fcntl$setpipe(r1, 0x407, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ptrace$setopts(0x4200, 0x0, 0x5, 0x40) ioctl$TIOCCBRK(r1, 0x5428) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000200)=0x94b, 0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:22 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:22 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:23 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:23 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:23 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:24 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:24 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:25 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:26 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x40000000) link(0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) chown(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:27 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xa, 0x9}, 0xa) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev={0xac, 0x14, 0x14, 0x10}, @in=@local, 0x4e20, 0x0, 0x4e22, 0x7a, 0xa, 0x80, 0xa0, 0x2d, r1, r2}, {0x1, 0x1, 0xa, 0x4, 0x0, 0x4, 0x24}, {0xffffffff, 0x7, 0x26, 0x81}, 0x3ff, 0x6e6bb6, 0x0, 0x1, 0x3, 0xc0d419a04f524644}, {{@in6=@mcast2, 0x4d4}, 0xa, @in6=@mcast1, 0x3505, 0x0, 0x1, 0x3, 0x0, 0x1, 0xe42e}}, 0xe8) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000140)) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) r3 = dup(r0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000480)={'lo\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r7, 0x7, &(0x7f0000002000)={0x1}) fcntl$lock(r7, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x2000000000}) fcntl$lock(r7, 0x6, &(0x7f0000000140)={0x0, 0x0, 0x371fcda8, 0x80}) fcntl$lock(r7, 0x26, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r6, r7, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@empty, @in6=@remote, 0x4e24, 0x9, 0x4e23, 0x0, 0x2, 0x80, 0xa0, 0xc, r4, r5}, {0xffffffff80000000, 0x100000001, 0xf2, 0xffff, 0x200, 0xffffffff, 0x4, 0x1}, {0x7f, 0x1, 0x8, 0xffff}, 0x3, 0x6e6bb1, 0x3, 0x1, 0x3}, {{@in6=@mcast1, 0x4d3, 0x3e}, 0xa, @in6=@local, 0x3501, 0x3, 0x1, 0x7fff, 0x6, 0x0, 0x5}}, 0xe8) 13:59:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffd}) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000140)=""/101) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) fsync(r3) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) r2 = syz_open_pts(r1, 0x5) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffd}) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000140)=""/101) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) fsync(r3) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff7fffffff) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x80011, r0, 0x0) 13:59:29 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:29 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:30 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:31 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, 0x0, 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, 0x0, 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, 0x0, 0x7, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="8bcf2809eb9ceaedb9ea5951e8bb12201da864c8bfe3f726a8316c6aa4c6e0ba79d8188ebe00925579d20b3a5652075fb43dd0dc486e9903a441b3325b8e27952456db3341566ca4899c7e74763667facc8413cbafc24a3cdd123cdd50a48c5f0cab3cc6e7128a9e8c30790f37d7b1b094bb18b2f9c55c789040806a148af3cec1b551222616fb8cbeabeec4da1f949b896a5cdefce6741b7576df1e3c4fb86f608681bb1509fb82", 0xa8, 0xfff}, {&(0x7f0000000240)="c07536f94ce118709b4027c7461ee931045f83fea494db1a4171f52bc609845d4b89f2e52cc700a1193ebec34fe9f074249cf9e3f190423af406af3cc7039adf09b90ed44ce1697b4ecf7b72da08", 0x4e, 0x6}], 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@inline_dentry='inline_dentry'}, {@norecovery='norecovery'}, {@noextent_cache='noextent_cache'}, {@nolazytime='nolazytime'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}], [{@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfshat={'smackfshat', 0x3d, '/selinux/enforce\x00'}}]}) 13:59:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:38 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x20001, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:38 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:39 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:40 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:40 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:41 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r0, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 5: sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:43 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:43 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x400000, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x2, 0x438, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f0000000040), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x40, 0x88f8, 'ip6gretap0\x00', 'lo\x00', 'rose0\x00', 'rose0\x00', @dev={[], 0x1e}, [0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0xb8, 0x260, 0x2a8, [@ip={'ip\x00', 0x20, {{@rand_addr=0x7857, @remote, 0xffffff00, 0x0, 0x1ff, 0x63, 0x1a, 0x0, 0x4e20, 0x4e20, 0x4e22, 0x4e23}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x7fffffff, 'system_u:object_r:wtmp_t:s0\x00'}}}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x2, 0x613, 0x5, 0x1, 0x0, "84cc00b65d7f49ecf032146a84ad442fc33ec1e7c0cb5623b37e87155c62dcc74aa5b49a6babba8cd29f5f4a02e81af6a6c2936dd4244438660b7d315f638aff"}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x0, 0xffffffffffffffff, 0x37}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x4, 0x8, 'bcsh0\x00', 'bond_slave_1\x00', 'veth1_to_bridge\x00', 'teql0\x00', @random="e71a804c8472", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @link_local, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xa0, 0xd0}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}]}]}, 0x4b0) 13:59:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000100)={0x0, 0x1, {0x0, 0x5324, 0xffffffffffffffe1, {0xffffffffffffffe1, 0x200}, {0x9, 0x8001}, @const={0x5, {0x5, 0xffffffff, 0x4, 0x2}}}, {0x56, 0x2, 0x0, {0xf30b}, {0x0, 0x4}, @cond=[{0x6, 0x80, 0x6, 0x1ff, 0x1, 0x7}, {0x7b4, 0x0, 0xfffffffffffffff9, 0x10001, 0x6d9, 0x5}]}}) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:45 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) fcntl$getownex(r0, 0x10, &(0x7f0000000980)={0x0, 0x0}) write$binfmt_script(r2, &(0x7f0000000b80)={'#! ', './file0', [{0x20, 'uid>'}, {0x20, 'uid>'}, {0x20, 'staff_u'}, {0x20, 'uid'}, {0x20, 'uid>'}, {0x20, 'staff_u'}, {0x20, 'appraise'}, {0x20, 'func'}], 0xa, "5833af211da80c2e04378913439fab2f2de66606403d81ad54b57e41ada8b01bca1afe41f36f619d5cbed18af107f7fd4b8e42281a5a00f10506"}, 0x76) get_robust_list(r5, &(0x7f0000000b00)=&(0x7f0000000ac0)={&(0x7f0000000a00)={&(0x7f00000009c0)}, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)}}, &(0x7f0000000b40)=0x18) syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x6, 0x5, &(0x7f0000000580)=[{&(0x7f0000000200)="9b821f40fe1d8dc5d3d3878a408040ff635d9deaddd42648872b927038e0a52c6c2679617a07d3b77d95b96644c001cdd06719377385cf6b59cd0e71f07ed2ed54c791edfd209816e309610b71cf5acef629040751fe29aeae08202fe6d33694a8", 0x61, 0x154}, {&(0x7f0000000280)="83e0c845a73400e103c7fabca7f6a90c8acbe2679c63", 0x16, 0x8}, {&(0x7f00000002c0)="737a076b46bb0f9aea2e27233cc204f3921cf546a077eb6112261d4adf119f1966bff5854ebcf7cd10f63d7367a134d649c790c49dc952e2d4d17b308132060737acc1e566ca454038e171ca6962cb239852c26bdd032fe3d3f9caecb977551cc449944ff0cab6c2440467ce9e5fa5748686b18be16fbe3d8bcaddf67c56dd0a06538788882f336fe6f7be73d3ce1996fc05ffa02b9fc8dee7e6946d85f8fb1cba2371417e3683d2de32c111f0702328d4fee290db79c60cb64254bc12250e3c2a8b59fc75ae1f4cabaa77a14b3ee7c1740641c96aea8cde04f32e8b9233703aabaa6454cebb3dec5b528fdd8527", 0xee, 0x1}, {&(0x7f00000003c0)="b74577d9d6831400991f107e2ca4018c972ea733ce043528226a6a53cb514c7848e1c26ea76e01fe4302515c8b4ff7d30d50bbfc15484bd8a10bce3fd48ebbdf5199d2263f53c367c14a9629dfbbfc0dbeb9f7e7d19476dfb94801c4b60249e09631c5232d5af50d74351cc2bb3ebacf29baf325568d35d738726957bec5b1e772d7c4e5c1c5466f06d448c012bd6f6093e32c2dbcc1070ffa0d1a0ecadb2b16a213ee771fac39f694051645c7d4f28e3b521ea9d3f31bc2", 0xb8, 0x8}, {&(0x7f0000000480)="a6df30e611b2350b1d500554fd78c5d10294924dd6c2b6abdc0925666a6b0ec08a990fbbcecaeb76bed804ba94fc91814aaaeaf03ba2de0c60b97bf8653d1b9d3573e7a913d4b30ae559de36727bc74674b98415def30ef799d00479de8c9d957f5e84826fc5bb0155c0394d74b4d6c31bd217d7ec72aec0ff27f2b1597dbb36ca0aa2f9fe64a2f2a02330a30355586f8325f8ced207431bbd2469413f356a86de755b1d207265db3f8ea7bb7bcc224904ef311bf44a5096b81267c838b702de32bb8bcc1942a16c467751d929", 0xcd, 0x6}], 0x800000, &(0x7f0000000880)={[{@fsync_mode_posix='fsync_mode=posix'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r3}}, {@appraise='appraise'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@uid_eq={'uid', 0x3d, r4}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000940)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:45 executing program 5: syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 320.078386] F2FS-fs (loop4): Unable to read 1th superblock [ 320.097077] F2FS-fs (loop4): Unable to read 2th superblock 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, 0x0) [ 320.138085] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 320.161347] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 320.199844] F2FS-fs (loop4): Unable to read 2th superblock 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, 0x0) 13:59:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000800)}) [ 320.387793] F2FS-fs (loop4): Unable to read 1th superblock [ 320.399532] F2FS-fs (loop4): Unable to read 2th superblock [ 320.418596] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 13:59:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x201, 0x0) [ 320.443165] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 320.452097] F2FS-fs (loop4): Unable to read 2th superblock 13:59:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, 0x0}) 13:59:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:46 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x102, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@can={0x1d, 0x0}, &(0x7f0000000200)=0x80) bind(r0, &(0x7f0000000240)=@ll={0x11, 0xf6, r1, 0x1, 0x5043, 0x6, @random="07b066270ee6"}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) close(r0) 13:59:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x193003, 0x80) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/member\x00', 0x2, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='*[^em1#\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)=']eth1\\vboxnet1bdevtrusted\x00', &(0x7f00000001c0)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000240)='mime_typewlan1\x00', &(0x7f0000000280)='mime_typetrusted(%\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='bdev\x00', &(0x7f0000000340)='\\!Dprocmd5sumcgroup,mime_type\x00', &(0x7f0000000380)='\x00'], 0x1d00) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffff) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x1) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x10, &(0x7f00000001c0)='/selinux/create\x00'}, 0x30) sched_getaffinity(r3, 0x8, &(0x7f0000000240)) 13:59:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x210000, 0x42) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000080)={0xeec, 0x5, 0x5}) 13:59:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004800}, 0x8840) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x230, 0x0, 0x101008, 0x0) 13:59:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x13, r1, 0x4) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000080)={0x6, 0xff, 0x8b, &(0x7f0000000100)="c7042eac6f899d30fb4ff1164e55e52f7cd989b0df81f640e15e735e70387605fbef777d6b08559fc661acb8a50333a805799d199c526eb6eda0e031727833ee5f2e1698214354c98c63225cd12857ea7fec9108cdd9cdbe5be823580f4cbf0e667cc8951679f6f64f650c39b0398825caa747f6ff33d68641fd80fc222c9b5d17ef51fd5d836cfea296f6"}) 13:59:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$TIOCSBRK(r1, 0x5427) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 13:59:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80000000) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xc0, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x1}, 0x4) 13:59:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 13:59:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40240, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x6) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) chown(&(0x7f0000000280)='./file0\x00', r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 13:59:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='environ\x00') sendto$inet(r1, &(0x7f0000000380)="6e22ac88278a587956d3562f45597eea35251d2ded62821715ae06326fa7ba8f99cef5eeec780895fbce2285615dee7b3a37d43f6c7f846ede22e510493645d93775d8f2679ece237ca8aa7e5596941b5f47e7d2882707a3e753e0633bbf153d4204b7d7f6117d47a2710eabf6f7f3344b825f2ea8485922fcfa459a588f489dff963fe113bc1c588d1bfb60629f839586aafd1861b8b8295174d95dc8e1fc3abe46717ee2", 0xa5, 0x20000080, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000440)={'syz', 0x1}) r2 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='lo\x00', 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)="621717db0317159505824d1a18367c77e9f0131cc8a6a88f68a6b31393045fa045b5530e379800023dfb9f5de1306538d440c10795ab5bb466575173b12889f9509e55134e8103a5aae76d11850e84519fc9b204625657b2d1e0809a8a6f473e1c360111182be38159bd8306ac71dedcefec8fd4d5b2d30140e5c8503c0c297c2aa63ea15105d9dd2ac0c4166bb1873213ded918", 0x94, r2) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x207) connect$unix(r3, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc02, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="30b35844f8de26e482167d3f754f08334d97776c39d739c7061bca7f26309b0dcdea834a5fbc5be8e32ffe8a118ad238") 13:59:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) uname(&(0x7f0000000040)=""/28) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/access\x00', 0x2, 0x0) sync_file_range(0xffffffffffffffff, 0xf72, 0xa2f, 0x3) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a4\x87\xcf6\xadWn2\x92k\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2*P[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdhy(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f', 0x0) dup2(r1, r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000740)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000980), 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000680)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x102044}, 0xc, &(0x7f0000000640)={&(0x7f0000000b40)={0x110, 0x24, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@generic="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"]}, 0x110}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0001000000ff000000000000c9030000ec000000010008000000000000000000002000000020000000010000000000006e5fbe5c0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpgrp(0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000880)={&(0x7f0000000700), 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, r7, 0x200, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x24048080) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r6, 0x0, &(0x7f0000000100)=""/29) sendto$inet6(r5, 0x0, 0xe7, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2}, 0xfa) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=""/18, 0x12}}], 0x80001fc, 0x12000, &(0x7f00000009c0)={0x77359400}) io_setup(0xfffffffeffffffff, &(0x7f0000000140)=0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') openat$rtc(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)={0xbc, r9, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x29aef84}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc2a5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4e27}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x401}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}]}, 0xbc}}, 0x20000040) io_getevents(r8, 0xff, 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000200)) fcntl$setpipe(r2, 0x407, 0x8) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x80000000004, 0x0, 0x0, 0x101008, 0x0) 13:59:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$unix(r1, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x800) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/rt_cache\x00') r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400000) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'veth1_to_team\x00', 0xff}) 13:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) syz_read_part_table(0x6, 0x8, &(0x7f0000001580)=[{&(0x7f0000000100)="6e45bc1c85000dc6cd9201eefbe6ee6fc7bd47373439fcb1a4fabeb16ebe4510c01dcf2612188ba6d39ffc4d0a7d3b817aed27670ed48d80344be72467a2a5447b44ac50ffceca829f435c7a0c0fd613f5edb02adeec6660bafbb80b7ccaac728d369f", 0x63, 0x200}, {&(0x7f0000000180)="64d3dfbeb6c95526b1b6ee02d03fb44b13f9c479ebb91180b5a6aab988f3f2826b6bdf01fc8849060ba30374b89a74962043c1f3c922dada3e98a56d18deecd89511d0323a3352d8b3f133275cff3e69ebe415d14747e5098841983761819f34e0456ff6f35e2f2bd433ceca3c42e34f2b30b1e52d7e688440010b50f8a1ae783a6e17e2e0d705bfb6da0910b717052fde149f9c120bcf31c3702bfc973988d8b827efe2fa95c8def8bd3887092e18d5f240fda4596686e7183fa29d7459972bb6aecac31460b394fdb849bc5a2be4f42b3061bd97f72d9cb61608db17acb720fba06aac6046c4d2819bdb986d228dbc3768f8ba42f477c1", 0xf8, 0x9}, {&(0x7f0000000280), 0x0, 0x7}, {&(0x7f00000002c0)="b337027f5e78cea3f8a0975d02e76759a66c701ea4ae1ecaf3b28984eb6019a3a80560ab88400d740c3286ee2adf0f7d8e32e30ee24a4c292088822ca15124d23661019ce797ea3dec9071fa48af523cc7dbd954405bc6f90c05bdbd15404af9089dc6c9c1f52e15ca84b284537d06c39592c2c967f960b07d16c7e9b4fa8893e50ec20f4bc6c0288c40f3d6142fd571a4256ab52f6567cc228609f046a83f17db39d2e95465f8590b", 0xa9, 0x100000001}, {&(0x7f0000000380)="037aa0586d5e14ae2e4825df0d4766a5dfac1aecbdd297a4e0fa0b0c42291a763d55b8377014319acae74632ce824a1fe6075e22f1005f30845004d8f11c6249d28f61a82b6e1089a325d8bf78892bacfbb162c94c72174698b11b18935ecfc5508e263217caf1031ed2de7dd58ec0b440fe9ed8f906ee5b552ec967a4c5f4a8d32b2e28836aee19425c0120ccbfa76d1e4a6f9c4604349c532f9e2e88c4fef6704f858f01bf35506450b8fe79a7627992c757109a7a4420fe823700f95c79bd4371834ae9209735ef9285500650c9a036c63e1f93d5479d5a88dc7e1d636d24a6687d64a4ad002252c3084f62274a58169edd8c64a6360e6b1fc28df02420637a6a20b6e6978dec68c2ad1b77f6cfdfffd145dd9a51ae3fdee02d525d76cba7a7ebfc128d6c4bd212f7ddece448e9d05046656f4e75440faf6983593d9eb30d8f1103f55b79d918577432fe6db9fa5b060b166ad7434403caa1ca3126fe7144eb9e4ed722e49ecef463742f7946f3cd7e994a805efbbf1c337f907674022b77ca49d9b685b126eafcc0db29ad69987644afc49b4a112625823a17441444815c1d439c23021ddea0a7aba52dd73bfb0176cec75333f95fcdae673820581f14d397367575db8e2dcea4e9e250a3a261da69ccb290bef5531d231a7194cd9582adaf18118a49b35ecacafbda015153c46fc08eff68a2913e721c9a725b8b290323ad56faa38571abf4cb805f0d86f8c2e72d3c604fccb01b4070bc40b3de0c8992a966cba68d1867752993dbb6e543858eb6f2b1bd3b19ad3ea82726b25d886d548680accd3c71fc4d00f512c37019d786f6e477fb4f669c2bcf7e8df9a27886fed6a76384c9ebf1734bef80d8788ca450f1068a0caaba897fc8006fb75893bd302236d0bb948f9689047ab15ef8be21117e296bcbb6e5e1ab3a0098cc4510b26b06a558ef0a5b9ac94b5afa8fcd40f07d0d800de8961a637751c2c4388ba7014b8f9c00de1d24fd7e9f8de40daf19d455d2350f6f7cc9e983fd6d518716984b340697f435faad0f967a253a3e547402a1f71eb5578f7d4fb2f9682a62c5504a35be451d0027d7e1a3c3d599ec03eea395eb0467941eca91aa760280586900b50659b087496f63e60bd2f50c4703a8adbf59e8865e7bd4b5c1fd0511f81953672cf63457566a3b3bff02b17689daa7e183f2630c1073727f686cc38302e8917d52f1179a5d93dd5304ee7c9a05ef725885d01b84fed5772bd0547942de4f43344b3bed181778f68d9c77a6ed53ff42640e7788a61f30d89f45f388d3effdacccb023821fc74590fd381f6dff0686406cb9761d102f334f5e646b168c208e3e85db1b5c5830cc34e858dac6f23e7f7f747fe5d91c5fdadc4130fd2f035910da909f9eaceb9420a2b3e643d896fff0ae0e8fe3cb333f4621d291d092694f82d6d120e49342b7756e1ef75d9f96029dc151c103869951fa87a4900afbf5f10b17c23acc617a42234b983594585324fbcada1fd30b40463fc3810a25448ad9dc86555cd76a72cf12da9e80bdd707634cdec228baf69cf9e7a8ae5899750c02b3ddcb8edaed0692821f664ae8cbd109faaa78aa8f5166670eae1dc3c02f307811780401ec9bc112163dec546330302821d4d2eb3eecab5431253435c39e594bdb6c96ea8e2355e2902d26a03a064b4309d432c3959a7e6f2de1bcccb7ac66a27f0c3e4260d9a1d91a25c3aa54ebee04ad328f76e1a66902eb56b3b159497d4bd23daf97b6b594b1ee706645abaf8efc1831ec0fc80a77a279024eede7dba4dc0fa21914343bba3d9ae1eb1eeccb2136907353dea0f27cd8d2d8e570b922d821a99f0ce05e0464b675f705441def09a50adf6c946fdbd0f60b0dce95a2e5df6abc46ffe1b7c8413bf34e59fc2f6083df4edf274c7b8cc2024d628c98e8e73accb39713816ed8f7c3d1c94b712d33610ff05673b6924182245c13c9dd4d69243a0ab0b1d15a179bd6cbf5b9f0b9cc763420bf385de973fa3de6ccffea5a74294a7b8900c81f9542158f6d2437e73a2733f3bdf0894d9b34c8550f959264bd0933d5862723da30f8114c81e5aa4951b15614d7920f5ee5d7775045f5172496c93d48e27eca64fabee2f878f22b57469c7c8d364b261f5cd4c58a8db55acd7e9f8ba8e5e20f91e8d1bd32763b6d5ae6e22b1c7c5c8f31456aee8df946563478ecb075154e6f3bf923490cba31c036ac6158a11e1ff1ba7a633f93b6280274204919809b7e0a405b6ff198bef3116d39e4d018cbd6e3acea07885cc6e02a8e98af06b51fff0ce0bd4437706c59ea387ee9d88d045817070729f24a7659566d23256d26b2903f180c84a570f5485e35a08d1f04e4d084dd9b5ddb9a4cffdf3444a652ba751c10c85c420c18854cbdc261d875283eb2babfbb8e2abe3dc5beadf33cda11be4bcb76542db6e8bc5a7e5d35c704dd4d30b775409706c06a44a6d97acac3cf18d87faa20f7eeb53d9a594854beeb121acdbcb70f4ef0082daeb5c9b09178e92320d949743f64f3b02ef06119c2a860daa877a91057ff9eee43f21ac08861375bbebd69d31e851450a49a41237d9ae2048c3015a5fc0e9fc06b8b09b3f7339550b6d5a74e2c52affafcd3b2031c614b6caa4714b8fee9f3e7acdaed1215f47232e00b1f6728a26948e4ccf6b0cf407908fea0fe5c95171056dc130d10a093779ae4b61c6bbe9ee94fba764576c8304c9347001be8028fb23e8aeb44150b4a6604c6874c1ed6502af3482e3fb723f532e2c2979d8a5e906fa51e35a4fc2d8b0d3cbf2192b67e60f30aaff3f20e032d318575dd0df8788ac9b299a8e8826fd1b58e1f8ace111762fc7a5afe7350aeea820776c2f2a55ddebab428f4ce719f3a7412e3ec51fa25de5e2c6595f0f0e48435daac6d747d3d9474894392ae6a4c972e88fe82a8a122a48084998c44cc179c38ca6a1da2414b6fcb0a68c9300b61c67c60cff12bd487f58791ebc3d2a6308469e077d5317b14b7e06555ca52518ec5462e7c3c2fe676315f2e5406c1cf3e3171cfc212508a56b69caf9e1845e2604456c8783a9921a5a2d1421612bf6e6841b2968c9f3180ab525512522f978e9048cbcb9d885b8ad99b4ea64ff82429e524153ce7727254a633160a1ed7c7efbdd91431eea354e1c2cffcc88f56b48ed5bb906554c629bca8c9d64c601c16177b29e0c1c58dea919de87f1210cf4976a174b68513fd262becb1affc598f421aa269609e173f1f35b276640771eb55a6e7c87927cda2a8e024e31c24eb12882ccbf64381a522c1a2342550cf08a1c7766e2ae55e3f74c33fa8e20ec42a73060f8fe6b51149143d9a3000ac6563b01eeff673e1491c87017ac48f223547b474641f1aa78abac14a70e008670e56b6e314f9efa0efa6264d87e5141fa2216ec74930768c308c2ce56e0f6a064049e03bc37d4249e3f98edf953044623ccd20c6b6a1fe92696c33ed5ed25a4c52e60532b4f0dbb47613b2415a73cd82fa813c0b391e5856f64707da9bf6107bfad71587963037e213d1ecffeaf9d225d8db9d6755224c55751b7132e75a921991c3a693de47c8bc27c1e075ec2150270afd54e554c008787c0d5f1bfd7c16a5f82a9946660fd54b2336b4ca7ec5211b823c16e88231f40438485f59264018eecb17dd208b5afc7cb85fb21a3a2cfdd7ea77f023364823b905e90d85daa2a55d68c39ec3b5f912ed2cd43bb99a78eab5d5593121bd2a6b85c4366e82265822bc88ca37a559e955f453f82f3f87055591aaa005212fac28779e724ec86f2b6599b92f663adee66940f74d2f6e31ddda746e0a7aeb9c89f9a319d42462678ab7d64e009fc6f63b0bde0a3f9daf0215b2c0a21c3856c17a370a31b24298b78bd3fcd701420c496b8f2819089891305192bf1a131df7e7db86ff5a4d6b0ea58cca143beb9b0bcf96d5e3e1144df1dd3ab0a56bc05b35232713935ab01d6b4f886ff77702227dca78d64460ef80b4c2319321c3cff289043f240639c68b968c4dc2eaabd9f0a5bd3dc15959ff711b01f017654fe82ef59cb53abd41464943b823ac10e7b9c066c5abfea9cc021039728c51a1b7f705b8661e5ab1046bf3706c11dcf227c0aed70885a4925267de4fa70a7546a89a5363704f2cd69976bad173ac5624994c677b90599286b612358d7051392ac42c3675cac49c7a8a0b8ac99e318a3fd71f286ae1106b42c0a1d69e27f6adec1d037403e610e29599cb890e900a7dc01758004d50b01a26b05700ca7dcbaa761d45c98c3cbff8bfb446ee06a19a58d309fa4fe0742a2569f8e82d003eeaef07e15bb152adce293e4f1502abc43887028b70f31026ffdc89a60df177df1d0b6a78b40e5c9b23cfcc8c68ca1baad2ad8ef9d85788b93c2137d726c5758f5e729ac5484045c809933675ca3158769309a828f57b0c3c6472627f21bc3665094bb60e3c9e1427cd247bb62c1e0db589314acc503e6cc73b6a7de7b93571368d2c5f2e3da83108fc8adddab2c00490bff9415e86bbdfbd6ccce5354c91f4fe7184419b8a6f9ec4b4139770c498102f16afa2ed62efeb6fddb2c84ec5c5254288e65f980840e5954c9530792e23fdf74ab335b654a8cdec3b05368ec80a1114e59b28611c7930f97827b999fe1f6ff6e36564a68380a772a5ffef0ce3b41fe47b0fc7dd84e5ec6a6ece3e3e1d4a948bf5c03d078122a78db9ac337decc504c177f9291fc4c7b48a5d090d3ce9a5a802b219e26cbbc057c82b4be8d525f9fb6d3d92c7a116d03f64403c7c8543346b025972ae85615410dc9dec754bc3bc0f9327387569842a9e344ff8cd129d8c0bbed500c2b930ba698cfd12846b36e0e13e48aaf519beda43aceb41a443724fc1bef877d7381ee3656fca56e3dc4bcec2f5a72448298c7b5894f82a0d2b7f904a18aa816cfa5cf03449c35ddf9a81fd0a9c81b7669af31a550ac98eb734413631361e7a0d2046df496a39dfe897577eca086c915bd00ab8181d19129fac48997ebe6a0a3574c898098a8bffddccce8b90c1300d2990dcf94b6c0e208afb97ad52506fbbe6e606efc7fcd5b18edf14bb728b39e1de407b8409b86f4f45ff07fb550e3e3810811f111764a584b9643cb42374ad2936283547fd17c0ea002fc32b9a95c5119cc1f0f7456a89a93464b2447256f161540a37b301de06dc3b8a4d6e80481a29c4e65d95519e10d99fda04156c29ca3f7976c78d558d5bca9fed36528bb4ebd6a4ce7147947fcd2319cb09e8df2031933d207864ab6f0201ccad0ea44555fe504d3da499b8bc075baa2fe7b5f553636190a8997017016d3e140bb98eb393cecb83b7d85fe290744775706ab36dbf627da94bc978e846f416b99a585c0e8901adefe28be97684e9fe48eb3e3c98ef42aba6bfe3665cbd9d2370a264dfbba670d2fb8c7fc769281fd76e50c1bcefdb37ce54ef27eb841492052abd0311b2bc3f6f9832e8487145bda6dd0e0918103baa66992cfb500b8f8b5e1db784abaa06d912cfbaa8ddb9a217b0f7e4e3e31016a58cef21a7dd62b338c7e852af47cf68162f68d52cde40bb8a395a284f512ff741434988ad1120aea71e158980ac181f42acac34361f5580d944a0c4e631bfc847b378bb9eb0abd4bb49a85cff75ea3993e0199e748841495c774c8f6a1e376c8e73bad16843cd08b5d56d47bcf374ca54261ac16203fd1514f2aa4aeb9acdfc3ec3e542911c0cced1198be8c02c7266363ab5c82e2ee7b39cd8f304691a51b6ae49d77b5de37e6eaff629c87c88", 0x1000, 0x20}, {&(0x7f0000001380)="1f1b7cbdf1a06f7c3d5dd66ceea6d5d233b7d60bb086f3f20e5645ef9acf7056bef37a9d813bce191f4d9b3fa2ea01668a575c5325a788d67b45e0da61c405da978f692aec43146dda1402a2acb4f44ac8c2a1ac8e9135337fd18c73f5106ed93864c7a7fc0d21d30949f570e45a3597b00ad0396124a5606e3051c5699ac475c5336183513da420c64879d4e27b3336166bd97364f081c785dae37469b3e41a347ef0ae5ba072cbdc9ae7ea505276", 0xaf, 0x6}, {&(0x7f0000001440)="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", 0xfd, 0xfffffffffffffffa}, {&(0x7f0000001540)="bd162f", 0x3, 0x1}]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 13:59:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xd9836f4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) lsetxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v1={0x2, "603d8f67b03dc04a0b375476e6db10c07927df2a"}, 0x15, 0x3) socket$inet(0x2, 0xe, 0x5) syz_extract_tcp_res(&(0x7f0000000300), 0x1, 0x231) 13:59:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000000000400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) fcntl$lock(r0, 0x26, &(0x7f0000000100)={0x1, 0x1, 0xaa2, 0x4, r2}) 13:59:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x255, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x12, &(0x7f0000000080)='.posix_acl_access\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r3) getsockname$unix(r0, &(0x7f0000000280)=@abs, &(0x7f00000000c0)=0x6e) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000100)={{0x280000, 0x1, 0x1, 0x8}, 'syz0\x00', 0x1e}) 13:59:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x88000, 0x0) fcntl$addseals(r1, 0x409, 0x9) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="fdfa67ad7566df8b2f9a5832b8a577848493f7770e37c953b78823bd2dc8902e2400bc122bbdf68a3dc87352801dfe014ea3b5ab40653f59b4fb752af6726dc3cf4de3405558e46a2aa6a280cefd6770b92662bd7f4523b49aea3b497f42c8cedcdfb010a7ebd12f4ec8d973264fe6aed852d0f61fa4a789ef01bc5043a0", 0x7e, 0x6}, {&(0x7f00000001c0)="edd1168ec41bc7fc235d2e00dccd6f16a6f2d47be21d0cd7a7502006341b43162993dcbf55274a2c31a401db446ba468ff72d324dc5199f0fb89cdc1947f5762b24aad5841796104970b4ebe2cd7ff8372689c5fc998ef8637ab8c1232a93b9ace433127c8acc8ff432007b9e1965b040bbf2861a2afc740368e6df6ad62b27675f5f853f4a7e7473e7ba194881bb4aa900b43", 0x93, 0x800}, {&(0x7f0000000280)="d15a3ab3d0f1ab37aed4bfd02623daa5f09f08ad163c3ea61208aee259dc977f55dc704f857624c1fbd557436f532214e4704db99e2adb52817c3bf4956acbd5ff43180612a9c0aa74706efad25fa0038680721052f77c2d59ea0bba25cb88c04a2899b4019391a1da62c27267407bcca7bddb60b6326dfd36b3941b5a0ecd239a61b190d350bc2ea8629d13d99370eef885abdda59557c2f64b9771", 0x9c, 0x80000000}], 0x400, &(0x7f0000000500)={[{@acl='acl'}], [{@obj_type={'obj_type', 0x3d, 'bdev}'}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_lt={'uid<', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x61, 0x30, 0x77, 0x35, 0x32, 0x35, 0x37], 0x2d, [0x34, 0x75, 0x37, 0x77], 0x2d, [0x65, 0x7f, 0x32, 0x3a], 0x2d, [0x39, 0x36, 0x7f, 0x62], 0x2d, [0x62, 0x77, 0x32, 0x62, 0x77, 0x66, 0x35]}}}, {@euid_gt={'euid>', r5}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x10400204) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000600)={0x5, &(0x7f00000005c0)=[{0x4, 0x669, 0x5, 0xfffffffffffff88a}, {0x80000001, 0x0, 0x6f, 0x200}, {0x6, 0x80000001, 0x0, 0x9}, {0x3f, 0x9, 0xaee8, 0x24}, {0x7fffffff, 0xbd0, 0xfffffffffffffffc}]}, 0x10) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffdb0, 0x0, 0x2008, 0x0) 13:59:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) setuid(0x0) prctl$PR_SVE_GET_VL(0x33, 0xf3fd) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) [ 326.915450] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.923490] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 326.934030] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.941366] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 326.949058] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.961429] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 326.968970] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 326.976148] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 13:59:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x102, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x50001, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:52 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) r1 = getpgid(0x0) fcntl$lock(r0, 0x24, &(0x7f0000000040)={0x1, 0x7, 0x20, 0x3ff, r1}) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x120) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 13:59:53 executing program 5: mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/152) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000500)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:53 executing program 5: prctl$PR_SET_FPEXC(0xc, 0x120003) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x5, 0x0) sysinfo(&(0x7f00000007c0)=""/154) getitimer(0x1, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x9, 0x9, 0xffffffffffffffc0, 0x9e, 0x0, 0x9, 0x1, 0x8, 0x5, 0x2, 0x3, 0x5, 0x2, 0xfffffffffffffe01, 0x7, 0x880, 0x3ff, 0x1, 0xffffffffffffffaf, 0x7, 0x80000000, 0x1, 0x1ff, 0xffffffffffff7fff, 0xffffffff7fffffff, 0x10b07b94, 0x80000000, 0x9, 0x4, 0x7, 0x7ff, 0x57ce355c, 0x3, 0xfffffffffffffdc4, 0x2, 0x0, 0x0, 0xb4, 0x2, @perf_config_ext={0xffffffff, 0x2}, 0x0, 0x2, 0xfffffffffffffff8, 0x7, 0x9c4, 0x10001, 0x86}, 0x0, 0x7, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0xe0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:53 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x107) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) 13:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r3 = dup3(r0, r1, 0xc164c147d34b4d31) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, r4, 0x24, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xad53}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4010) 13:59:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xa) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x2000, 0x8) ioctl$TCSBRKP(r1, 0x5425, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigaction(0x3f, &(0x7f0000000140)={&(0x7f0000000040)="c442fd1e9dd3000000c4e169e818f3436c8fc870a29483292dd8c727c4a2fd3343b9470fc13cdd10929fc4410faeb547f4b9a6c421fe16370f381c7a32c48150c26e0000", {0x80000001}, 0x10000000, &(0x7f00000000c0)="f298c4a258f55200c4c10d73f13ac4c3395cc200400ffd9d36f32520c4229da806f2460f01c4c4818d72e20665f2adc4e2313f4a30"}, &(0x7f0000000200)={&(0x7f0000000180)="6666400f3a171779c422ed00661440de5634470f38035b3343dcb9000000008fc848ee4600e9c483790466e0000f62a09c000000abc403f963a330000000aa", {}, 0x0, &(0x7f00000001c0)="c422f91cf165f30f0009c4a27d0ee0660ff5973e000000d2b4bcf5090000c4c27d799b3d700469c421f972d4090f105801c4c2053fe6c48114574105"}, 0x8, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:53 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) [ 328.537951] audit: type=1400 audit(1545141593.921:51): avc: denied { create } for pid=20651 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 13:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 13:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = memfd_create(&(0x7f0000000040)='/dev/loop#\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r1) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') 13:59:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:54 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x5, 0x8f, 0x5, 0x0, 0x8b, 0x7, 0x8, 0x5, 0x0, 0x200, 0xffff, 0x5}) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x2000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000001d00000000000000000000000000000000000098000000968a009a89400c21884f33d36a9161d520deb7adefa2fe7afb22b4a013cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b7ef78bb844bb1bc42885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d52456e501d4bbbe6e1b80944f9acc33e706d2cbc01feee3513bd6649f3af066f39283e95e27fc3cb4b625528d2a90573d65214032ca15d910e835e9e987a8f156cd528ba9901a4d89dff8408d4e6104dbfc9257e88f2ebb58c686a59f5eeef3d7842d222e9c6201121b0887433f2915967625a815704bd329ae71ed7e70337fb9ac40618915ed201083de17c1fe8e58cee3eb7167b9d1762bf88bdfc2adcbdb5fe3bfb535f7c6d594d8d2a852ffe0d0ecaecc48d0f051ad6a57fa88d6c4e2bffbfb22df464bba9534a58d524e7d848a5d99732d5a73cc88e9b339c6436cc1306bbe91e6c6fbed1ea87ac1c2c29fc6ada97cd657a7cd6afffd98f4737664dea489a711037c8679d30cfd19d6bf987545d86c53e0f80f111d7e55dcc374518400b2ff407b0df549cb3cbead3c663807cb4028fe4fd10abf54b5e5e521bd6364f1f04147f8ae87794567ca550c67202ef42e0e1cf992853fecb19a24d426b63448c947bcc8bfdbc97636704911275b75dc8c24caaac68ef103387fe01529b007b04bf20e5aaf2722ce3eef23a23aab3b8c0c0de2ed82d95763d60b8a7ce8dd477e3a7272c0b99f8c5bedf8aa61a4157f966b06ffded82581f2ead4f3bf0489e5f0e15bbe07f738322919f14bb60d19c7b0503252cbb7a88dc68c4261a514bb5d1e132f89c4796996ae0da770a22e6869559475cb07ccd727a0a343"], 0x0) unlink(&(0x7f00000001c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) fstat(r3, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x2) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000140)={{0xff, 0x0, 0xbe3, 0x1}, 'syz0\x00', 0x47}) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 13:59:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x400, 0x200) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x100) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x4499ccd2) 13:59:55 executing program 5: r0 = add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="c30eaa33673e89ba362c9ddd73281a8270c82e6c1e7ad17588857392eb28556ff1ce32a410c11149fa921e224ade079b8b2507c4e2d6a85fa53823a5327b52095ff23cfd22bf7749c105265e94aabd610e4d51796fa2a07f90155bf9bfe769cc3ba3f4bd2e9a431861b85d9d323ac964bbbc762d1fe85d1ec871af11526fbc4d94e46ffb752d57ad8c6e076d69dbff2105b15411b2a47be7c182", 0x9a, 0xffffffffffffffff) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)="db34b5b14808a046b9cd82aaa25c9459e1c59a557981e024701e279655472e3c90fc060cb3a89fa32454f497f5fb16e718b57c913e6161bc1f914cad80758d8be6578f5172c451c379d7e45913c4ef7665cdd1a0eccfd5dacc71cea7a9296243c3834b1c9d01cd08cc7c746dd37a36e6e72c066e882924f5c8bf8f341a0ae1a7f0082c71c8ac33d82b76f2cae15aafd2427237fad6ee0be4811eba7fdb8e0d21f442d5", 0xa3, r0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000340)=""/54) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2001, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x5f, "52e4c95bb2df6d2f73d6c4b98377e7788ecf7f244eb0d5b75e94b09f6cdbfb5da312716a4d32ab39dda8a9b0ef72cd7e1b81601104b744fc36ebd54fbe7be9d7c50856d66a29af795acaec417f8f7b5740729ac5572e2e0cad89af1034af93"}, &(0x7f0000000240)=0x83) r5 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x400000) 13:59:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x101008, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10000) 13:59:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x1, 0x3, 0x5}}, 0x14) 13:59:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000004c0)) fstat(r1, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setuid(0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getrandom(0x0, 0x0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x2c) 13:59:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000080)=""/53) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 13:59:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10001, 0x50) finit_module(r0, &(0x7f0000000080)='/dev/loop#\x00', 0x3) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKRRPART(r0, 0x125f, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) prlimit64(r3, 0x8, 0x0, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000), 0x10) [ 330.284454] ================================================================== [ 330.291944] BUG: KASAN: use-after-free in get_disk+0xb7/0xd0 [ 330.297733] Read of size 8 at addr ffff8881d19f1eb0 by task blkid/20794 [ 330.304475] [ 330.306097] CPU: 1 PID: 20794 Comm: blkid Not tainted 4.14.89+ #25 [ 330.312405] Call Trace: [ 330.314992] dump_stack+0xb9/0x11b [ 330.318551] print_address_description+0x60/0x22b [ 330.323400] kasan_report.cold.6+0x11b/0x2dd [ 330.327812] ? get_disk+0xb7/0xd0 [ 330.331266] get_disk+0xb7/0xd0 [ 330.334553] get_gendisk+0xe4/0x230 [ 330.338180] __blkdev_get+0x345/0xe50 [ 330.341987] ? __blkdev_put+0x6e0/0x6e0 [ 330.345959] ? bdget+0x426/0x4f0 [ 330.349329] blkdev_get+0x97/0x8c0 [ 330.352873] ? bd_may_claim+0xe0/0xe0 [ 330.356668] ? bd_acquire+0x149/0x2c0 [ 330.360471] ? lock_downgrade+0x560/0x560 [ 330.364615] ? lock_acquire+0x10f/0x380 [ 330.368585] ? bd_acquire+0x113/0x2c0 [ 330.372400] blkdev_open+0x1bd/0x240 [ 330.376109] ? security_file_open+0x88/0x190 [ 330.380518] do_dentry_open+0x426/0xda0 [ 330.384499] ? bd_acquire+0x2c0/0x2c0 [ 330.388326] vfs_open+0x11c/0x210 [ 330.391786] path_openat+0x5f9/0x2930 [ 330.395599] ? path_mountpoint+0x9a0/0x9a0 [ 330.399831] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 330.404354] ? check_preemption_disabled+0x34/0x1e0 [ 330.409370] ? perf_trace_lock+0x11a/0x4c0 [ 330.413610] ? perf_trace_lock+0x11a/0x4c0 [ 330.417850] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 330.422775] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 330.427719] do_filp_open+0x197/0x270 [ 330.431545] ? may_open_dev+0xd0/0xd0 [ 330.435369] ? _raw_spin_unlock+0x29/0x40 [ 330.439540] do_sys_open+0x2ef/0x580 [ 330.443260] ? filp_open+0x60/0x60 [ 330.446809] ? up_read+0x17/0x30 [ 330.450183] ? __do_page_fault+0x64c/0xb60 [ 330.454422] ? do_syscall_64+0x43/0x4b0 [ 330.458398] ? do_sys_open+0x580/0x580 [ 330.462306] do_syscall_64+0x19b/0x4b0 [ 330.466214] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.471431] RIP: 0033:0x7f0603307120 [ 330.475137] RSP: 002b:00007ffd346a9c58 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 330.482843] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0603307120 [ 330.490105] RDX: 00007ffd346abf1e RSI: 0000000000000000 RDI: 00007ffd346abf1e [ 330.497360] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 330.504608] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000010f6030 [ 330.511855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 330.519130] [ 330.520733] Allocated by task 20760: [ 330.524428] kasan_kmalloc.part.1+0x4f/0xd0 [ 330.528735] kmem_cache_alloc_trace+0x138/0x300 [ 330.533381] alloc_disk_node+0x5f/0x3b0 [ 330.537335] loop_add+0x3e9/0x840 [ 330.540768] loop_control_ioctl+0x12e/0x310 [ 330.545071] do_vfs_ioctl+0x1a0/0x1030 [ 330.548934] SyS_ioctl+0x7e/0xb0 [ 330.552310] do_syscall_64+0x19b/0x4b0 [ 330.556195] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.561371] [ 330.562980] Freed by task 20785: [ 330.566353] kasan_slab_free+0xac/0x190 [ 330.570329] kfree+0xf5/0x310 [ 330.573410] device_release+0xf4/0x1a0 [ 330.577304] kobject_put+0x146/0x200 [ 330.581002] put_disk+0x1f/0x30 [ 330.584309] __blkdev_get+0x564/0xe50 [ 330.588107] blkdev_get+0x97/0x8c0 [ 330.591623] blkdev_open+0x1bd/0x240 [ 330.595316] do_dentry_open+0x426/0xda0 [ 330.599294] vfs_open+0x11c/0x210 [ 330.602728] path_openat+0x5f9/0x2930 [ 330.606508] do_filp_open+0x197/0x270 [ 330.610312] do_sys_open+0x2ef/0x580 [ 330.614002] do_syscall_64+0x19b/0x4b0 [ 330.617866] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.623029] [ 330.624636] The buggy address belongs to the object at ffff8881d19f1980 [ 330.624636] which belongs to the cache kmalloc-2048 of size 2048 [ 330.637449] The buggy address is located 1328 bytes inside of [ 330.637449] 2048-byte region [ffff8881d19f1980, ffff8881d19f2180) [ 330.649498] The buggy address belongs to the page: [ 330.654402] page:ffffea0007467c00 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 330.664367] flags: 0x4000000000008100(slab|head) [ 330.669120] raw: 4000000000008100 0000000000000000 0000000000000000 00000001000f000f [ 330.676989] raw: dead000000000100 dead000000000200 ffff8881da802800 0000000000000000 [ 330.684844] page dumped because: kasan: bad access detected [ 330.690530] [ 330.692146] Memory state around the buggy address: [ 330.697046] ffff8881d19f1d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 330.704377] ffff8881d19f1e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 330.711710] >ffff8881d19f1e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 330.719043] ^ [ 330.723945] ffff8881d19f1f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 330.731296] ffff8881d19f1f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 330.738631] ================================================================== [ 330.745961] Disabling lock debugging due to kernel taint [ 330.751432] Kernel panic - not syncing: panic_on_warn set ... [ 330.751432] [ 330.758795] CPU: 1 PID: 20794 Comm: blkid Tainted: G B 4.14.89+ #25 [ 330.766307] Call Trace: [ 330.768874] dump_stack+0xb9/0x11b [ 330.772397] panic+0x1bf/0x3a4 [ 330.775574] ? add_taint.cold.4+0x16/0x16 [ 330.779713] kasan_end_report+0x43/0x49 [ 330.783674] kasan_report.cold.6+0x77/0x2dd [ 330.787978] ? get_disk+0xb7/0xd0 [ 330.791429] get_disk+0xb7/0xd0 [ 330.794708] get_gendisk+0xe4/0x230 [ 330.798333] __blkdev_get+0x345/0xe50 [ 330.802124] ? __blkdev_put+0x6e0/0x6e0 [ 330.806086] ? bdget+0x426/0x4f0 [ 330.809442] blkdev_get+0x97/0x8c0 [ 330.812971] ? bd_may_claim+0xe0/0xe0 [ 330.816757] ? bd_acquire+0x149/0x2c0 [ 330.820550] ? lock_downgrade+0x560/0x560 [ 330.824677] ? lock_acquire+0x10f/0x380 [ 330.828635] ? bd_acquire+0x113/0x2c0 [ 330.832429] blkdev_open+0x1bd/0x240 [ 330.836143] ? security_file_open+0x88/0x190 [ 330.840556] do_dentry_open+0x426/0xda0 [ 330.844517] ? bd_acquire+0x2c0/0x2c0 [ 330.848331] vfs_open+0x11c/0x210 [ 330.851788] path_openat+0x5f9/0x2930 [ 330.855604] ? path_mountpoint+0x9a0/0x9a0 [ 330.859825] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 330.864310] ? check_preemption_disabled+0x34/0x1e0 [ 330.869309] ? perf_trace_lock+0x11a/0x4c0 [ 330.873535] ? perf_trace_lock+0x11a/0x4c0 [ 330.877758] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 330.882673] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 330.887593] do_filp_open+0x197/0x270 [ 330.891397] ? may_open_dev+0xd0/0xd0 [ 330.895193] ? _raw_spin_unlock+0x29/0x40 [ 330.899331] do_sys_open+0x2ef/0x580 [ 330.903061] ? filp_open+0x60/0x60 [ 330.906587] ? up_read+0x17/0x30 [ 330.909938] ? __do_page_fault+0x64c/0xb60 [ 330.914155] ? do_syscall_64+0x43/0x4b0 [ 330.918114] ? do_sys_open+0x580/0x580 [ 330.921998] do_syscall_64+0x19b/0x4b0 [ 330.925873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.931040] RIP: 0033:0x7f0603307120 [ 330.934729] RSP: 002b:00007ffd346a9c58 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 330.942416] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0603307120 [ 330.949667] RDX: 00007ffd346abf1e RSI: 0000000000000000 RDI: 00007ffd346abf1e [ 330.956922] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 330.964176] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000010f6030 [ 330.971426] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 330.979058] Kernel Offset: 0x10400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 330.989958] Rebooting in 86400 seconds..