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"}}}}}}}, &(0x7f0000001340)={0x1, 0x4, [0xa1d, 0x304, 0x643, 0x21a]}) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{[], {0x8864}}], {@ipv6={0x86dd, {0x0, 0x6, "b40057", 0x300008, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:34:59 executing program 2: keyctl$join(0x1, &(0x7f0000000080)={'\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xa00, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r4 = dup3(r0, r3, 0x80000) write$UHID_DESTROY(r4, &(0x7f0000000d80), 0x4) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000d00)={{0x7, 0x0, 0x82, 0xffffffff}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x00', 0xfffffffffffffffe}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000003c0)) r8 = getpgrp(r7) r9 = syz_open_procfs(r8, &(0x7f0000001000)='mountinfo\x00\xd2\x16\xef\xc1lak\xf0\xd1r0\xa2\xf3I-#}\xccQ\xf7,\xa1\xb9\xcaE\xc7<\x9b\xd9\xd5)\xfbcH\xd5\x13BV\xcb#\x02;\x9eY\xb8\xeaV\x1a\a\xc8G\xfa\xdcZ\xc9\xd6\xd6*\xaa\xb2\xc3N\x11\x8c\tLLB&\x11vy\xb6\xe1C\x16\xacf\xe9\xd1\x01-@\xf8Z\xcd\xbd\x8c\xf7\xd1\xade\xb6\x0fNM\xbdk\xb3\xcf\xf6\xd6*\xed\xd2vB\xb6\xd4t5\xdab\"\xc6\x10\xfc\x0f\x9c\x90+\xb5\x00PBG+\x8f6\xbc\x1e\xad\x1f\x16\xab\xfd\xb7\xdc\xf7f\x16\x02\x9aW\x90\xe2\x10\xc3\x1a\xffs\xb3i\xe4\'\x1f<\xa5\xf5\xd2UG\x01\f\xa5A\xe0\xcd\xb1\xf0x\xf6SFh\x83\xcd\x0f\xf9=\xd9\x9a\x10\xb8\xaf\xd3\x8e\x055\xc72\t\xbb\x8e1K2;\xc7\xef\xde\xd5\xec\xe0') ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x801040, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) mount(&(0x7f00000014c0)=ANY=[@ANYBLOB="d9592946257a207231d38901983eff975acceede4aeb1d3e3e17c36e865613b5ff0c0a95ffa6ec90c96dcf96f392405ea83cab77f672d322b10e5fd60cccf4bfed40344b299d9f950d6d69b2d83f0c4ed42354a4f6f7530c10cea7be15bfa00e603ef2cf6f374185bd6badd7e3aba21cf73b1532d9385fa7d7c19dddd82baef1e8c93f3b208a6870c93a8b71a9b3861b563d1435e267edafd638b3a66f735a509b77ca6c77679249ee0107af043504bb8e8170d2b86c94bf5f0f67ae330e2150"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x5010, 0x0) 09:34:59 executing program 4: r0 = socket$inet(0x2, 0x80000, 0x100000001ffffffc) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) 09:34:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x400071, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/179) [ 120.094469] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 120.128329] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. 09:34:59 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xfdf2, 0x0}) 09:34:59 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x2, 0x0, 0xffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:34:59 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48001, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) dup2(r2, r4) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/fscreate\x00', 0x2, 0x0) poll(&(0x7f0000000440)=[{r5, 0x2000}, {0xffffffffffffffff, 0xa020}, {r6, 0x18205}, {r3, 0x240}, {r7}, {r8, 0x40}], 0x6, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000240)={'L-', 0x8}, 0x28, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) truncate(0x0, 0x0) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$int_in(r9, 0x5473, &(0x7f0000000100)=0x2) r10 = add_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000680)="1cd16b0f1be4f21481d8ca08878c370fa81f16924ccdeeff18b8d5b2b4a28f17e462bb3b3b998abaf1f3c6ef95c0cd994c20755234d22c6e3349bdaba299388d4b9cf695e6f492905c4c019d7327f2941e8a5d5a706c40737e0534e7af76e1d82b1502b8dcda5639124f7ed8dade42a940745c185e82c59c7aa7ce200c7d9c5c616efc512079390f027be6ae4f29a263d8fd38a109ffeecb74fe6a816e74712ea7a54d90afeafbccd826bd608ccf2d0abc07daf23352f7042d3d7de09ad948f2418a87d3c998c1cf433343945cdb22e545eb6dfb398930af7f6d2c650a51d8f0ae1d9d5ec0ab8e618141", 0xea, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r10, 0x10001) 09:34:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$getownex(r0, 0x10, &(0x7f0000001380)) 09:34:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv4_newroute={0x1c, 0x18, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1c}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) 09:35:00 executing program 2: keyctl$join(0x1, &(0x7f0000000080)={'\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xa00, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r4 = dup3(r0, r3, 0x80000) write$UHID_DESTROY(r4, &(0x7f0000000d80), 0x4) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000d00)={{0x7, 0x0, 0x82, 0xffffffff}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x00', 0xfffffffffffffffe}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000003c0)) r8 = getpgrp(r7) r9 = syz_open_procfs(r8, &(0x7f0000001000)='mountinfo\x00\xd2\x16\xef\xc1lak\xf0\xd1r0\xa2\xf3I-#}\xccQ\xf7,\xa1\xb9\xcaE\xc7<\x9b\xd9\xd5)\xfbcH\xd5\x13BV\xcb#\x02;\x9eY\xb8\xeaV\x1a\a\xc8G\xfa\xdcZ\xc9\xd6\xd6*\xaa\xb2\xc3N\x11\x8c\tLLB&\x11vy\xb6\xe1C\x16\xacf\xe9\xd1\x01-@\xf8Z\xcd\xbd\x8c\xf7\xd1\xade\xb6\x0fNM\xbdk\xb3\xcf\xf6\xd6*\xed\xd2vB\xb6\xd4t5\xdab\"\xc6\x10\xfc\x0f\x9c\x90+\xb5\x00PBG+\x8f6\xbc\x1e\xad\x1f\x16\xab\xfd\xb7\xdc\xf7f\x16\x02\x9aW\x90\xe2\x10\xc3\x1a\xffs\xb3i\xe4\'\x1f<\xa5\xf5\xd2UG\x01\f\xa5A\xe0\xcd\xb1\xf0x\xf6SFh\x83\xcd\x0f\xf9=\xd9\x9a\x10\xb8\xaf\xd3\x8e\x055\xc72\t\xbb\x8e1K2;\xc7\xef\xde\xd5\xec\xe0') ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="e24f63a4fb6cc3480f41aed915759712397b34cc7fc62abc2c59b029dd81761d4a5a70c766fa1bb7cf3274254719fa43e97b6851a3eb123ba9e9a99b541ad0af78775962ccdf640a7321ce330b55684d1788c6ff515188e0351911f63e7044d706cb7693b9aef73dfc337ceee538abba7fad3ee2bb8b5f63f263350f0e0a637da353272483bd16bd603989384065556512d3b1bec18912156c1108a06d6622217bcb14d013ad644cf35e4d3cf98ad201936e8b5f53aca9080cecd4aeba304e0e17959c738252644a7e896302a82ca1ec2efbffa56d8c58b7242c2297b43f217407268dd64acd4bfe2b27461ebb50072008b90ea66768ad8366b44ac500f6d8e42f04008f112e78479d1745dac3767d0380e0b68fd229eb0247c94b761b4c49b42734feebe57c7c40a39cd1f5f2d458ab832a02eaf840b7a1b9812844bc277ddc406ddde177e7c266120b2dd7104555b8bf8a404c36a9f9474e3bab09f095c4d47363f2b3c3518c8cf70e75653546e62767a17f55fe5c44bba7489296f8382b213d1afaa2d63c146359359cb0c2b8eb87bd4673e24def3aed8e1be4024f42e21bd513f5502427b48bc73077efecd6f50efdabf17881"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x801040, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) mount(&(0x7f00000014c0)=ANY=[@ANYBLOB="d9592946257a207231d38901983eff975acceede4aeb1d3e3e17c36e865613b5ff0c0a95ffa6ec90c96dcf96f392405ea83cab77f672d322b10e5fd60cccf4bfed40344b299d9f950d6d69b2d83f0c4ed42354a4f6f7530c10cea7be15bfa00e603ef2cf6f374185bd6badd7e3aba21cf73b1532d9385fa7d7c19dddd82baef1e8c93f3b208a6870c93a8b71a9b3861b563d1435e267edafd638b3a66f735a509b77ca6c77679249ee0107af043504bb8e8170d2b86c94bf5f0f67ae330e2150"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000001300)=ANY=[@ANYBLOB="447e8d0e010800000000000000da67672556dd286111b6db5bb1aa0b10674609eae299999ae213149ed93f8c5784c744c86cc2fe1d7ea960933871fd7072d81fd9575ce0b5822a8d23985f17c5d13bf003571edf9a6a29e11e30a522bf4f0fa3fd89f8c290bddddd62e37585a284283bf300594ef8d5fc3323836c5fd3273490cf84aafb73ca5ec733f17fe4f75adfa4592bd1aaec6bcde200db6807f655ba792b1d0fea9e36b61ef3fd3bdcff3c9d93b05b72a008008980d3b4fa02000000000000000f81c12731d548717178715841154f2ec6c41df75b29105f7efeb471b7f9c3d91142f9aa51122849f4e5f990f4923f8170a4dd7d90ef7c59f3b0e48a6553d376964e246e2383bb5cf494d03e14ffd578d6d1f0b88bae1ccf6e8be9ba559ba9033e47e766195e7cc62e602b09bf648f5f99d005b0d57ca505a7503e9526b904dbc68fd92425f931c2fa7a567d213119f30948f6a6301419ee185826fe3a532f0f592196db8cf261c0c10ed914239ea730541b1e1fb1dce997357f33a22f4a697c476eb7640245c1eb454a0cb8c043e30927fc456667bb0609a6075dff56"], 0x0, 0x0, 0x5010, 0x0) 09:35:00 executing program 5: r0 = socket(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 09:35:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x6d, 0x2, 0x0, 0x0}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f00000000c0)="f0e7ba0ebc4f5875176ddc857d6992b88de582690b02c4a3b080c37466bbfd87ea1c3808697a008ac5891c6cb9f0d0b1f5cfcb61f192bbb15df639b5be4e9107b11038a0c65ba62a45065e4087d44614ca5d25310da7c13efe7261baedf81d8218290752c1d2a188e2474cde2efecdc57538f638a9528f33c2d11003008acc3801fc502bc60f1c844d77f1664c5485f980e07d63e1a857223db00fafed7da6b5ee354aaf37001db468dd5557f16547db13629dd2562fe7005a72b25df526dc58349ddf4b428096eb6230890b58872370b2229e9478b0ff5130"}, 0x20) 09:35:00 executing program 5: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000100)=@objname={'system_u:system_r:kernel_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0xfffffffffffffffd, 0x20, './file0\x00'}, 0x59) [ 120.581037] audit: type=1400 audit(1567935300.095:17): avc: denied { map_create } for pid=3559 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:35:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000380)=""/41) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) timerfd_settime(r1, 0x1, &(0x7f0000000180)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000001c0)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x6d3) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000003c0)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000000)=""/56) write$FUSE_STATFS(r2, &(0x7f0000000100)={0x60, 0x0, 0x7, {{0x100000000, 0x9, 0xff, 0x1f, 0xffff, 0x35dfeb5f, 0x3, 0x94}}}, 0x60) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f00000000c0)='\x00\x00\xff\x00\x00\x00\x00') 09:35:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) unlink(&(0x7f0000000080)='./file0\x00') sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv4_newrule={0x0, 0x20, 0x100, 0x70bd25, 0x25dfdbfe, {0x2, 0x14, 0x14, 0x400, 0x8, 0x0, 0x0, 0x3, 0x1}, [@FRA_FLOW={0x0, 0xb, 0x7fffffff}, @FRA_SRC={0x0, 0x2, @empty}, @FRA_FLOW={0x0, 0xb, 0x80001}, @FRA_DST={0x0, 0x1, @multicast2}, @FRA_DST={0x0, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}}, 0x0) [ 120.611655] audit: type=1400 audit(1567935300.125:18): avc: denied { map_read map_write } for pid=3559 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 09:35:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x3a33a2d746961181) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 09:35:00 executing program 2: keyctl$join(0x1, &(0x7f0000000080)={'\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xa00, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r4 = dup3(r0, r3, 0x80000) write$UHID_DESTROY(r4, &(0x7f0000000d80), 0x4) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000d00)={{0x7, 0x0, 0x82, 0xffffffff}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x00', 0xfffffffffffffffe}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000003c0)) r8 = getpgrp(r7) r9 = syz_open_procfs(r8, &(0x7f0000001000)='mountinfo\x00\xd2\x16\xef\xc1lak\xf0\xd1r0\xa2\xf3I-#}\xccQ\xf7,\xa1\xb9\xcaE\xc7<\x9b\xd9\xd5)\xfbcH\xd5\x13BV\xcb#\x02;\x9eY\xb8\xeaV\x1a\a\xc8G\xfa\xdcZ\xc9\xd6\xd6*\xaa\xb2\xc3N\x11\x8c\tLLB&\x11vy\xb6\xe1C\x16\xacf\xe9\xd1\x01-@\xf8Z\xcd\xbd\x8c\xf7\xd1\xade\xb6\x0fNM\xbdk\xb3\xcf\xf6\xd6*\xed\xd2vB\xb6\xd4t5\xdab\"\xc6\x10\xfc\x0f\x9c\x90+\xb5\x00PBG+\x8f6\xbc\x1e\xad\x1f\x16\xab\xfd\xb7\xdc\xf7f\x16\x02\x9aW\x90\xe2\x10\xc3\x1a\xffs\xb3i\xe4\'\x1f<\xa5\xf5\xd2UG\x01\f\xa5A\xe0\xcd\xb1\xf0x\xf6SFh\x83\xcd\x0f\xf9=\xd9\x9a\x10\xb8\xaf\xd3\x8e\x055\xc72\t\xbb\x8e1K2;\xc7\xef\xde\xd5\xec\xe0') ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001780)=ANY=[@ANYBLOB="3897bc1e23d3971005000000675766d6275488bb0fb34f52ffa1089abf3a2dda6cac0800005d2f056d02000668ac6d16dcf001c0c3704e9f3f984b6b7b1039cff4d93e445671550a8131d13742117f95776e403c0d952457da93dc92edea1b0e566212bf568027931fc9ae3e97ce046199a7ae23ce9289035055c2053608d2125ce7fa1affffac113254d302360f7d46a21249835bafa46a082f5f32344ee9a77ede73f4ee1bc3cd35d9570000000000000000000000000000007c6a4b1ee6f703e124e6a581b1aca6033984c14d6be20bd8ec8df86468b9ec805df855b5a65b14b9cd60999bea54c8edecbc53b343db649943563bd57a4646dc1a772fff3804eb65206471dbc6cddbed364697e951be2d3b71075d5934e92ae9498455f9ef66631db120df59639b5e30332bb87f8276cf446bad4c9625a895cb404006959de8ab40135a8226e55c5dcbc5d493220779b1d6ec372d8acc9013f0acf9c5ca8435d03c8b31e6a285e86f9819f2113f04511db5202dcdb057a66eb97c655110e90ea3305f0f9ae5a9d3b8cf7eaef569d1aa0ece9a2f303f052c3c40fe3bd8dc7e044dcb48225f2b2ae5236082fab82f887482a63e2e401bc3fb27027814a55bc5f9bf5dd6b755ca4ab9e0b1d6878d602421c1e8f49d6a8fb4dc261bdaa0c2aaed64789c1f8399d86fd1597ac2f718f8993641388d8bd675791c6f449304c6d2f807590b"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x801040, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) mount(&(0x7f00000014c0)=ANY=[@ANYBLOB="d9592946257a207231d38901983eff975acceede4aeb1d3e3e17c36e865613b5ff0c0a95ffa6ec90c96dcf96f392405ea83cab77f672d322b10e5fd60cccf4bfed40344b299d9f950d6d69b2d83f0c4ed42354a4f6f7530c10cea7be15bfa00e603ef2cf6f374185bd6badd7e3aba21cf73b1532d9385fa7d7c19dddd82baef1e8c93f3b208a6870c93a8b71a9b3861b563d1435e267edafd638b3a66f735a509b77ca6c77679249ee0107af043504bb8e8170d2b86c94bf5f0f67ae330e2150"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000001300)=ANY=[@ANYBLOB="447e8d0e010800000000000000da67672556dd286111b6db5bb1aa0b10674609eae299999ae213149ed93f8c5784c744c86cc2fe1d7ea960933871fd7072d81fd9575ce0b5822a8d23985f17c5d13bf003571edf9a6a29e11e30a522bf4f0fa3fd89f8c290bddddd62e37585a284283bf300594ef8d5fc3323836c5fd3273490cf84aafb73ca5ec733f17fe4f75adfa4592bd1aaec6bcde200db6807f655ba792b1d0fea9e36b61ef3fd3bdcff3c9d93b05b72a008008980d3b4fa02000000000000000f81c12731d548717178715841154f2ec6c41df75b29105f7efeb471b7f9c3d91142f9aa51122849f4e5f990f4923f8170a4dd7d90ef7c59f3b0e48a6553d376964e246e2383bb5cf494d03e14ffd578d6d1f0b88bae1ccf6e8be9ba559ba9033e47e766195e7cc62e602b09bf648f5f99d005b0d57ca505a7503e9526b904dbc68fd92425f931c2fa7a567d213119f30948f6a6301419ee185826fe3a532f0f592196db8cf261c0c10ed914239ea730541b1e1fb1dce997357f33a22f4a697c476eb7640245c1eb454a0cb8c043e30927fc456667bb0609a6075dff56"], 0x0, 0x0, 0x5010, 0x0) 09:35:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3b17, 0x1c000) fcntl$setstatus(r0, 0x4, 0x2400) 09:35:02 executing program 1: ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x14002, 0x100) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_tables_targets\x00') ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) quotactl(0x201080000100, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) openat$cgroup_ro(r3, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) linkat(r1, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x9504268ed913522) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) 09:35:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) dup2(r2, r4) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/fscreate\x00', 0x2, 0x0) poll(&(0x7f0000000440)=[{r5, 0x2000}, {0xffffffffffffffff, 0xa020}, {r6, 0x18205}, {r3, 0x240}, {r7}, {r8, 0x40}], 0x6, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000240)={'L-', 0x8}, 0x28, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) truncate(0x0, 0x0) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$int_in(r9, 0x5473, &(0x7f0000000100)=0x2) r10 = add_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000680)="1cd16b0f1be4f21481d8ca08878c370fa81f16924ccdeeff18b8d5b2b4a28f17e462bb3b3b998abaf1f3c6ef95c0cd994c20755234d22c6e3349bdaba299388d4b9cf695e6f492905c4c019d7327f2941e8a5d5a706c40737e0534e7af76e1d82b1502b8dcda5639124f7ed8dade42a940745c185e82c59c7aa7ce200c7d9c5c616efc512079390f027be6ae4f29a263d8fd38a109ffeecb74fe6a816e74712ea7a54d90afeafbccd826bd608ccf2d0abc07daf23352f7042d3d7de09ad948f2418a87d3c998c1cf433343945cdb22e545eb6dfb398930af7f6d2c650a51d8f0ae1d9d5ec0ab8e618141", 0xea, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r10, 0x10001) 09:35:02 executing program 2: keyctl$join(0x1, &(0x7f0000000080)={'\x00', 0x0}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xa00, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) r4 = dup3(r0, r3, 0x80000) write$UHID_DESTROY(r4, &(0x7f0000000d80), 0x4) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, &(0x7f0000000d00)={{0x7, 0x0, 0x82, 0xffffffff}, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9e\x1b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\x00', 0xfffffffffffffffe}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000003c0)) r8 = getpgrp(r7) r9 = syz_open_procfs(r8, &(0x7f0000001000)='mountinfo\x00\xd2\x16\xef\xc1lak\xf0\xd1r0\xa2\xf3I-#}\xccQ\xf7,\xa1\xb9\xcaE\xc7<\x9b\xd9\xd5)\xfbcH\xd5\x13BV\xcb#\x02;\x9eY\xb8\xeaV\x1a\a\xc8G\xfa\xdcZ\xc9\xd6\xd6*\xaa\xb2\xc3N\x11\x8c\tLLB&\x11vy\xb6\xe1C\x16\xacf\xe9\xd1\x01-@\xf8Z\xcd\xbd\x8c\xf7\xd1\xade\xb6\x0fNM\xbdk\xb3\xcf\xf6\xd6*\xed\xd2vB\xb6\xd4t5\xdab\"\xc6\x10\xfc\x0f\x9c\x90+\xb5\x00PBG+\x8f6\xbc\x1e\xad\x1f\x16\xab\xfd\xb7\xdc\xf7f\x16\x02\x9aW\x90\xe2\x10\xc3\x1a\xffs\xb3i\xe4\'\x1f<\xa5\xf5\xd2UG\x01\f\xa5A\xe0\xcd\xb1\xf0x\xf6SFh\x83\xcd\x0f\xf9=\xd9\x9a\x10\xb8\xaf\xd3\x8e\x055\xc72\t\xbb\x8e1K2;\xc7\xef\xde\xd5\xec\xe0') ioctl$sock_inet_SIOCGIFPFLAGS(r9, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) mount(&(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x801040, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000001c0)) mount(&(0x7f00000014c0)=ANY=[@ANYBLOB="d9592946257a207231d38901983eff975acceede4aeb1d3e3e17c36e865613b5ff0c0a95ffa6ec90c96dcf96f392405ea83cab77f672d322b10e5fd60cccf4bfed40344b299d9f950d6d69b2d83f0c4ed42354a4f6f7530c10cea7be15bfa00e603ef2cf6f374185bd6badd7e3aba21cf73b1532d9385fa7d7c19dddd82baef1e8c93f3b208a6870c93a8b71a9b3861b563d1435e267edafd638b3a66f735a509b77ca6c77679249ee0107af043504bb8e8170d2b86c94bf5f0f67ae330e2150"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000001300)=ANY=[@ANYBLOB="447e8d0e010800000000000000da67672556dd286111b6db5bb1aa0b10674609eae299999ae213149ed93f8c5784c744c86cc2fe1d7ea960933871fd7072d81fd9575ce0b5822a8d23985f17c5d13bf003571edf9a6a29e11e30a522bf4f0fa3fd89f8c290bddddd62e37585a284283bf300594ef8d5fc3323836c5fd3273490cf84aafb73ca5ec733f17fe4f75adfa4592bd1aaec6bcde200db6807f655ba792b1d0fea9e36b61ef3fd3bdcff3c9d93b05b72a008008980d3b4fa02000000000000000f81c12731d548717178715841154f2ec6c41df75b29105f7efeb471b7f9c3d91142f9aa51122849f4e5f990f4923f8170a4dd7d90ef7c59f3b0e48a6553d376964e246e2383bb5cf494d03e14ffd578d6d1f0b88bae1ccf6e8be9ba559ba9033e47e766195e7cc62e602b09bf648f5f99d005b0d57ca505a7503e9526b904dbc68fd92425f931c2fa7a567d213119f30948f6a6301419ee185826fe3a532f0f592196db8cf261c0c10ed914239ea730541b1e1fb1dce997357f33a22f4a697c476eb7640245c1eb454a0cb8c043e30927fc456667bb0609a6075dff56"], 0x0, 0x0, 0x5010, 0x0) 09:35:02 executing program 1: clone(0x80000000000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="5004aee564df371de87d5829f0b9f00579c91fde84631bdd431b57cf963ea1e4c6439b5cbfce5057bfafbc5ea5fe4590689854fa72f0559b521cd15c6cf6c87b7895d1e845953f07cd2b98f1fffe78a08d29411a865ea1177e2b91c64fb4b7b04c3a3b48ac", 0x65, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r2, r3, r4) r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r2, 0x407e, r5) r6 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x363) ioctl$TCSETAF(r6, 0x5408, &(0x7f0000000000)={0xffffffffffffffff, 0x7, 0x1ff, 0x80000000, 0xa, 0x8, 0x2f, 0x1f, 0x1, 0x3f}) ptrace$cont(0x19, r0, 0xd, 0x0) 09:35:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0, 0xffc0, 0x0, 0x2d3}}, {{&(0x7f0000000280)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, 0x0, 0xfffffffffffffda2}}], 0x2, 0x64008022) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) lseek(r3, 0x0, 0x3d0fd7e66262fe6f) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x5, 0x7, 0x0, 0x1f, 0x100000001}) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x1}, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 09:35:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x200, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000300)=@gcm_128={{0x7}, "b9bd3c7815698e18", "4b00c4577fa77f7579d9b4ab5402af22", "00d5f8b1", "5c27bcabf7598300"}, 0x28) r2 = gettid() r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7fff, 0x3, 0xc94, 0x4, 0xa, 0x3, 0x0, 0x0, 0x9, 0x0, 0x4}) socketpair(0x4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) gettid() fsync(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000540)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 09:35:03 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) rt_sigaction(0x25, &(0x7f0000000580)={&(0x7f0000000300)="f243a7c4222d2d01f343abf3410f0d0c83c48311790c4c07660fec4e082e3e0f495a3d6765122a8f49e896c8c4817d2ff5", {0x4}, 0x80000000, &(0x7f0000000500)="c422493b0c54c463214835bc0000005066450f0067efc4c3b9cf29f936d3baf40000002ef30f1ecb420f658a0b00000065851fc4a16758a200000000c402f923af133a0000"}, &(0x7f0000000640)={&(0x7f00000005c0)="64f3420f01e8cadb2c460f1c4e00c024517d67c17a000944d15e008f29a0948a99899999c4a1fd109a4f000000f0805ed8f645e24e", {}, 0x0, &(0x7f0000000600)="c4c1fc5569038fa9e094a0bf000000c4e27d19dcf343a7450f5bc4dbc1f364450fc172178fc948945a00c4a208f24c5806f7c5435b118f"}, 0x8, &(0x7f0000000680)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x138e8) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="fb8fa11d2ab66cf1fce626179a157c43f8cabdadd3bf7340826c9e0320721d1310a89a1537df8066983df21219bc0e4491e8e3df8e2694959b5784046f81b5073dba5485c4445dfd36eb1a274f29daf91a8b9f7b50110500bd7aca181386a6f991a9164af5553fdc275e978e10899b6878f03b8935e7eeec237a98ed75488cc1faec96dcbedb91fd"], 0x1, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0x20000357) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000000)=0x80000000) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000000600)={0x0, 0xfb, 0xad, 0x2, 0x100000000, "2f08197ea9efbfa696ec81b56f7f9730", "54f5e5766dd3bd4abf7c1591052a25a8d60b7c6a6fb8fca5b155fc7c54f8b1eb8656314977014a0b430506aa21e1b50b5c666ea4a0539cc8e4b5c8832d0c4157bed01272b214fceb5137f19b3d8b5bed2a2de3faf789aa27f1f31dcd511b48a15d10daa3429eca42d906f9c5c03cbf20cbbe93b4049af920ae47a34335b483e2b5e2f366050cc5458f2d6bfee67eb97efe0c2d074c3b57a0"}, 0xad, 0x2) openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fstat(r0, &(0x7f0000000180)) fallocate(r1, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000), 0xa) 09:35:03 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x3a, 0x100, 0x80000000, 0x5, 0x4, 0x2, "91df1f393efee97d1c205b6a842a0f42dc5fd1f75cc9bbdb94e6a5b38624f12cb0ff2cca01577a6f93ea5601fee06b044c31f43a3debcba668ab"}, 0x152) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b53c38f19c0403cd80b4"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRES64=0x0, @ANYRES64, @ANYBLOB="d6a241c1505ce7aca56db4b51e820c909d3319f04bf1e721f254f28790a0874bb23d80358eecedf71a6b6d06033ceac45e205dc00765c63fc8a15c2128a24b0bf4c4184ec17ead9de423855f3a1ed9be1d4063", @ANYRES32], 0x0, 0x7b, 0x0, 0x20000000}, 0x20) ptrace$poke(0x5, r1, &(0x7f0000000080), 0x9) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 09:35:03 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) close(r0) inotify_init1(0x80000) fcntl$setstatus(r0, 0x4, 0x400003fff) close(r0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x400000, 0x4) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) ppoll(&(0x7f0000000180)=[{r4, 0x200}, {r2}, {0xffffffffffffffff, 0x20}, {r1, 0x100}, {r5, 0x440}, {0xffffffffffffffff, 0x8}, {r1, 0x8000}, {r6, 0x2020}, {r7, 0xa376}], 0x9, &(0x7f0000000200), &(0x7f0000000240)={0xffffffff}, 0x8) 09:35:06 executing program 0: r0 = gettid() clone(0x8000001000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0xa4, &(0x7f0000000140)=ANY=[@ANYBLOB="8500000000000000250000006c342ee8d42b76ccb7cc22ebfc688ddadbe6be0000000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000180)}, 0x48) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 09:35:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedc\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0xfd13, &(0x7f0000000240)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xda, 0x10, &(0x7f0000000000)={0x3, 0x0, 0x1}}, 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 09:35:06 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) recvfrom$packet(r2, &(0x7f0000000340)=""/204, 0xcc, 0x40011001, &(0x7f0000000100)={0x11, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, 0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0_to_hsr\x00'}) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000540)=ANY=[@ANYBLOB="e4000000210000012abd7000fcdbdf25ac14141100000000", @ANYRES32], 0x2}}, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) 09:35:06 executing program 3: lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="6274420f5f890900000000"], &(0x7f00000000c0)='ramfs\x00', 0x6, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x128000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101000, 0x0) r0 = gettid() tkill(r0, 0x1000000000016) syz_open_procfs(r0, &(0x7f0000000100)='stack\x00') 09:35:06 executing program 0: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0xc6, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'\x04\x00\x00\x00\x1eU\xc2\x8b\xfa\xc0\x12\xdcg\x00', 0x1}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) getrusage(0xffffffffffffffff, &(0x7f0000000340)) 09:35:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)=0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, r6, 0x1000) getgroups(0x4, &(0x7f0000000700)=[0xffffffffffffffff, 0x0, r6, 0x0]) r8 = gettid() getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r9, r10, 0x1000) getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000200)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000180)="b419", 0x2}, {&(0x7f0000000280)="d1894db500417507ec73fd7a2a5d9b5383b9b4246fd8ea8b79a0e3bd8066ad4e796bdf3672249f765e34a09018d9d8e501c8fe06ea70ce9993fbf70314d243786dd6bc8e64c4d935ca01e4b5bc688f27fec31e2748d675d630cda897bbf78d01d22fba571bd99ad2491d38e4757572a28215cc38bb6059930c5f7a3a8f8ed7a0bfa2b9e749c1d895b0b81673855765b4d4babbdaa3bded5b076ecf84d7600f23728d6322404db5a1", 0xa8}, {&(0x7f0000000340)="dc139ee4420c54c1f9f5d7d32e890e25737af386f460fa1306c345c6320872ddc2e083632b84b37609112e133d99e4ea1d1105b4ab1f53c5dd05e1fb4e269d5c6af8fd92541191f917dd0ead944358e02066a874751c7936d542b486466b7d21d09b27991d9ea290a41995d039105a312bbb3b8327e74785e9d4e2b26c3b1441", 0x80}, {&(0x7f00000003c0)="98b4e9f3e79f815fd2ec9b06e33a0a0b1a337de32b1ccdbe21d0bfe0ed3a25c57bdacdd3a2f5a0f1f1f08023fc35ada72bb6e3de0ee75d0d64061b757355be32408fb87e04c292413237cf2e663f45505956d401bca062793036889dd40d0c16902cea3c8e243011eb9466f48ff109767c7de34243d6444ab918eebd45b5e4995470", 0x82}, {&(0x7f0000000480)="da1d08ea1ed424eb8d57e8191df27fb54d54f36d36", 0x15}, {&(0x7f00000004c0)="72f4b0a2221c05dd464498a2f41e44b6b6e638bb2336d79e91e26d6233d20d6d9ba0ea41ecdadbf219f9a1bcb09097e47a5f94c786382152b2da37093184f66a9ec1bb3f2617a4b3be6ec36fcdde12b52814d49dcf69a22a7f66bc6e8e60813a15a171cf1e96284d190f648d7c4ff9ba52a76ee135ac5368c4d6612f6a3288cdadc7b5e528a2b93471ec6f58f03bc19507168e6d4d641b88a33716f8de647d9e279348fbae6f97027ebf4798dea6ff32f4bc6b81b9fb98b477e632b7916b6fbe7f181d355b1ed308a7103013c43180a1e9df508efe03a7cbf2e80947b5954aaa4c5a989d7b40016a8bacb9", 0xeb}], 0x6, &(0x7f0000000800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2, r4, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r11}}}], 0x70}, 0x800) syz_open_procfs(0x0, &(0x7f0000000000)='fd/0\x00yFAtz\x9b\x88\xb3\x04\x04\xd7a7\x1a\xb2h-ex\xb4\x13\x89\xc1\xc6_\xd9\xb3<^\xfe\b\x10\f\xad\xf6\xd6J\th\xeb;!o\xa2\xcf\xc18)\xa29\xca#9\xbc$\xfd\xef~\x12\x81\xd4\xc5~c\b\xb1\xb091\xbe\xe0%k\x83\xeen\xa6R\xab`:{\x97rg\xd3.\x13\x10\xaf]\xc1\xf7\xec\xcdz\xb2\x00W\xd5G\xff\x9c\xa4Z\xac\x85n\xcc\x00') r12 = gettid() tkill(r12, 0x1000000000016) ptrace$getsig(0x4202, r12, 0x8001, &(0x7f0000000980)) write$tun(r1, &(0x7f00000008c0)={@void, @val={0x1, 0x0, 0x100, 0x4, 0x100000000, 0x10000}, @mpls={[{0x374, 0x0, 0x5}, {0xa8, 0x0, 0xffffffff}, {0x2cdf4435, 0x0, 0x4}, {0xfff, 0x0, 0x5}, {0x8, 0x0, 0x1bb4}, {0x1c00000000000000, 0x0, 0xf24a}, {0x9, 0x0, 0x4}, {0x5, 0x0, 0x4}, {0x7}, {0xf47, 0x0, 0x80000000}], @llc={@snap={0x55, 0xaa, "d587", "bbfb20", 0xf7, "05b726bfc1e9a1341032220bbdbb6f7aa45f7cbfb019ddc9adefaabe33727d289d3087373480264c54a82a9a4390a69d733eeca22e8d47c53432c2816cc209769a6cc6cb59f6ddcb8e219c5dbdf3"}}}}, 0x89) 09:35:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c40000001900010000000000000000f5fe010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRESHEX=r0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001f000800080000000000"], 0x4}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 09:35:07 executing program 2: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="0600003f10d47978be3d3c7f2e02157607b1a586ae3fe486d971c82c874de7563f0788b5b101118a0adecb50a8dc33bd60565c705dd85fbb31345e0b24e51db59ddddb88b9c9e50f0000"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a, 0x0, 0xffffffffffffff40}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7e499f5c5fd21dacb7b35ad29999e5deb90bd622b9f4a177373afcbc3b5bf61816d9162b65cccc061c938047d9953b277929434509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca2313", @ANYRES64, @ANYRESDEC, @ANYBLOB="9f3388c5b87b558d8aedcbb605ebcfca9ba7a5b7f64c5649b189d8f1e87738c76cf8a8e40ead6546a01dc8324804152153099135c04f290d", @ANYRES16], 0x0, 0xa4, 0x0, 0xffffffffffffffff}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:07 executing program 0: socket$inet6(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x500d02, 0x0) r4 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r5 = gettid() fcntl$lock(r4, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x0, r5}) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000680)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r6, 0x6458e4f74edf81da, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000300)={@local, 0x0}, &(0x7f0000000340)=0x14) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2012210}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x7c, r6, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x27}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8084}, 0x4000) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6b3e3e9ae21feded}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r6, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x1) openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x2, 0x8000, 0x54, 0x7fffffff}, 'syz1\x00', 0x3a}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10000, 0x3}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r8+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:35:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = gettid() tkill(r3, 0x1000000000016) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, r6, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r7, r8, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r9, r10, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r11, r12, 0x1000) getgroups(0x7, &(0x7f0000001700)=[0x0, 0xee00, r6, r8, 0x0, r10, r12]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001740)=0x0) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r15, r16, 0x1000) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = gettid() tkill(r18, 0x1000000000016) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r20, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r20, &(0x7f0000000080)={0xf}, 0x20000357) r21 = signalfd4(r0, &(0x7f0000001900)={0x8}, 0x8, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001940)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001a40)=0xe8) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r23, r24, 0x1000) r25 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r25, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r25, &(0x7f0000000080)={0xf}, 0x20000357) r26 = fcntl$getown(r25, 0x9) r27 = geteuid() r28 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r28, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r28, &(0x7f0000000080)={0xf}, 0x20000357) fstat(r28, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = getpgrp(0x0) r31 = getegid() sendmmsg$unix(r2, &(0x7f0000002080)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)="064980cf6439c7b1e75a82b690295dc4c881a6fa936b18681f52f0e2d400f43ed0a995f7dde3c902a36df193917ec178f8dce872d32de10ca55bed357172ab484d40e9173f180aa4b011b96f8ba3576d9f30291ea71e608178c4231c6e87452fc2f674edda688cc4b65348", 0x6b}, {&(0x7f0000000280)="2c857be2faec02eebf43b3a737e769a08879ab958590ae0da9f4b1e4f96f7969ec675fce50702f060d47136d211e42ace2958330ebae120a588abb01e7504c8847cbbe57808028b96b630e4e14665c5ed445f5d41eea0f2ded32f51aeddfff0e29f86300958c643a862f88b02816c6eb03ed206b14a3ae6d1b1a37c9b914523b5c97e08d4b57fd7aa7ebaa1ab2ba7a", 0x8f}, {&(0x7f0000000000)="1420850f7f2d008e05d71ab1feb61a92972f291cbef560bbf6cb6d0bc143cbbf8104a9339f1a00e13e", 0x29}, {&(0x7f0000000500)="964daadf7009c973e3155ab152ffe494b53e45a0836f6601563cb4fdfb48c39882da4e4870ff9fd71e6f800ab0db6c9134f0b686029713f39fa5d20ab1b10c4960d3e05db78e9814ec7c29db6912845e3319cdb6131661616dbde12a7befe0cd11c883829286533bbfd99c07a83837c8f784f31e68e363138bd72b8042555678fe64e0f7ae76625dd654a814c0669ec3db210e543065c7dabcfcd7cd9d53f10221bbf86129ef8d850c7db473de589acb5f0d88d73235cf75114de72fc57709980ba1b16d838c510d2140f6a45a311754ce8a9f0f26fa45730c53db9e1feba24727a7261e7d076d5d4d5207dfff7b", 0xee}, {&(0x7f0000000600)="754633ca1238d4ccb8ef3593c30a2280886ee1de7450e72cc4fd1922b219ecaead9479f11ad041cd921898faa0f9068d2736bca6b71a16e718dabc9f781275feaf455592f0cf0410e52067643291fcba92b47e07a991a75eb80df25ca294e0495412b1074d8676f7b57fcc495ba515dcf491c593fb88358e4fc9878569255140bd11d0c27c9e9353c97d4d1961a8c36b4ff2934f92010b31ec58a3456672c5004394a3ee22633dc562195f67086e6e5207a689372b51c9c97c3f8b75d53a5ba2a934a4f7ae7f3b92b5726558d7c713344c75e7a683a6ff7b1e95fb9de6954b44ee37349d6f3a64187acab1a5428264dc16555d67a67a6e2d78b7e9ed3351fea5fbec1bf29cf27c8a3a84fcf9ed5bd0064e6ea934609e9d0e52e777e6bbdad10e83768e4df217fe5448de35e2dbc66c270b4575063c72cdbb757ec2b2ac5a73bd1e514bdc2bc79a43e8a6e094ba2a112b1842dc84bb0d8df970a11732d23e534086513682b1dc30c15f994b4d7e912a2df33382bad0c0698c5267d1cb2def5b5321951535f9fcdf72434cc4cf4901a82b8e0582d06253bc02d3d42d2985f2dcb322d6f52a6285a1b104f60a5551afd298e1a14b3187364fbaef3e8272ec66a1871fbeb99f998cbf87aba6bb7b55a24c24252cc72a4be93e142fbd1a9e90a0bf98276adecb099631d6a79fd751f45f93af25e6e5aaffcd10b8c18e8a1844055d85eb6b86c22f81376b0446543ddf3672ba9e5d150a8021fefa3fae625494b8bbdd8e26a0df03d5b0eaf682adeeef54e673bff0f91b9e00393f4bec3967fa3095f6c61a6b6f4cb07e2196139dae55f3821ae33dcf52498914ec4ac7a65c65b14f87724c0defbd90d946e8a634db3df5bedcae6830aad29809f5bf78bcfe666a3fd7c26d249c8a118efba4eb6172c5347c838add3bcd4f10e3f74c00ec3de2bf005771e497729f6664a2223a3960ba81ad6e68a0dd9ebc09e45abff653ace932f827aa92a898b7fd2e0539bc87de1801439519e451b527cf1b0e50322b25a0a7e20935f6ee43c9de3c07927dd67c46530c0f8bbab970cd15c81e2e4ae43dc3b95fd743c8d4080e3d9273d120f69386b357652c74a3b214f94ab3ab8fbb2a773ad91cef4255c489bbb4b46ca4063a1ca8ec075276cc23850251ce80f22093843a98d5aaf48e69550218b309fd927be95e0cab4c248212eabaddf7d88000d1ff54997d07ff306b44c6144f7147c193b735b79df51b816d8e5a9e2c2e608df0b50e0341523db522c2d1ed51d3f45b97c5d3914b1c3773610e58cc0379679e0ecd38f19bd5d5ba6694e953cc9e2d95a667f4eb189a4d6953802d60d443396d0b9e0ec133c09e238f7beccb44f30b43d13e1360ec5a2c4d78582189806c0b88b5cd7354642b2e194bb207415f5a1501752649d3710eb7c7519686e10fdcc0a65b6f22062ee580e51cf66ec7cd14399f35ed965140788ffa5b3e5df782b15493e2fa273a7723e6143c3fd380f559660a11ccc35eff48b66da0aec8d0e372874397dadc4114713041d6bab7d9f86d574314f318eabebb909f8e3666bbd9429416d78047e4f817d3e6b1932126e23d2dbddf08720e37db1d09b08d43c153fdd39c564b721246c496fa84423e4595afdb4e7c449c81c2324b585423fc10393e0d5b55c75bca586588a7c0128d7a63161715f3014f53d5d9a42704f0a8d69e934589fa58b77b5d65a73c26e45a74487b7714aa005cea709bf049f62885e28abcb00aaa3c7eea22597fc9d78ae71d2e6cce7d4de94af7de4266fc695c95fe8e5f4752e43527a14456a62a67b7fa28044a152061dd1c916ecec31ea125dbc986c368e58867e5bdfbd22027b1596d62303e3832ace33dbd545c759b3b0b5be1d127858babb9afcc94f637fa377fead06261480389eae6eccccf2ba10eeb82d50842529507ce52ef2e879098adcbc9d98cfa38279c8ad8ac106cba85fbabded4d172f9573419e28ffd7a30e2936b41f82ef8040eb9fe387965bc90ba7f87930cc587cf6fd3b7dd712cb6c0b5ae573cb01a37d18844b4d406167de89a917aef8453e317e814479acd5bd409106ccb04f847e655d9402f10547078e614ca808387a2a80868cab9039e3dae51130bc815d6b67e1847cf7dcdc9075acde1d83057ea97950adc4b86dbe6ccb4fccc9052b0629cbbf5eebad820403b92bffaab9417cf6b3db820be709f50510df2529a8ef01fbc91073a249cc8d218281f9980d3e2eecf3bc6edff1f38a2e88376c14d424dba3ce629fab2f58d21db4cbd8991bd61faac2307a373acf114d24cb547987db34fea41e188829d1f9367be82ebd70bc24b8ae18e1a21c4c550d0f680f6c5cf2bd32e387d0a24f878e1d7b3e7d1905c3c256ab63b9ce895404deb96fe667436618b7a1dcbe462eba29c2dbc554eeb151216f2ae4da8098b98cd1eea649a2db2a1d1c180a0f6f08755d2a879deb99eb08c58f61a82ab24b342571806736b5608c618367ef785ac673ac6d08907a63608d94f15c3da6d0f2a48262f8f028df366aaba01aeabfdde9ad9b1bf71db01bd39284ef5e144ef4671537da5e2cfe6df0608604be35262211b5a0fec4156e97a1f707bdc6c9bb276a286ea2c97f2f72468f0115a9eb914d74a1717e44e7fdf1de341db1a84390e30da96d277827725408ce56545c1436981903d60e3966b566c7346391352276af0685a1b6588e63345456ef38ac3133afe5e821aac4592bc0220b0fcfbb3c428c4d4c50dd80fad1f517a2c9f86b3bac486cf820c1c16380c52f70b69cdcdb2d2b2b5dad023bd550319b4ee9f112ad5ea33e238a939d8705f450b877244bad8d510d216534cd95b7225dfa9bb50fb283baa5d2da713a9c1f2f3e9158ba006edca3c89d9667d913eb6fd73b8f386e64c1f22e4315ea317299308e3eafe9e1897bf4579683586c88148ccc2326f344abb851f57c6c4f68cf69966628dab09544b1d1b24ba98bd3d5562b290f626faf4b46b30446b8d45fa78cb287b5287a6647b049ab230e3cbe11b1032ce45de960f72f4e7501ad164377d23b9585b51a3fde202d920e08f6dd6e805e55d9203cb1b8d4b06b83b73438522660627333d2e51b0135a37016b9d2307dfff4fdbede325ae771d51f6a15a96983fdcb275d8c28e562d7177e45458d15ed08a0547f5aaaf553570d248418ea5a92c0edcff79819f45f7aef932089fbacf352e71dfb5aac1c5fdce89b4ee0734abebce620513718c9711d1eaaa183e120f3529547590a96bea50b5df250623d3df29cb1089aaa1d48f55abbab1504907b25745a9b5ac7e3e0f88479a4b10ae64821ff9591a288ab7f6df3961aedfcb69f74da22d7bc42901d9f88456eb8b21c4e38b6b8be00be9d461c496786b9a1d47876c31d33554365162599f7463f054a7e2d94a5b1c3bc0dbffb8663bcdc0b3331d5c29c2b9a734f660031d342fccd1c4c0632455d96e7067ce04ed8da3670a367c46cff7388edce865875d714ee5ba1d0225c3412bf5711d34de51b4236e23d1bbd9cbc118ba9a05f8d7bdaed7c7ebc428ca43d03f5b48d11a469ecbedaeca75d9ee717ccf893c94d944553013df4e3177d256df6ddb686ee989d193978dfeb553fc66fa018cc62b511de054f6c72f761f622d35bd425d5b3e9d0690af49c378d6f9ddbab09ad577bec338e363eb28b967f763cd1bf9675714205b5dee98ea09d7a8ffa2146b23b3f3a03d6609c2888c5cea36b7b91bca17cc16825dbc681c5f7be1fe237e67f235f383a9c8d70fb246da904f1cd1d46ccd11a7d307a9eab8d6efaf9b7ccb51867b611e0f2cffc34caacd84beb66ec2fc80137b28d8cced0a262672f41b7cd36225d2fe48591be8618301a5c2217edff357ecff3a8e5419c7d62d35f3091fc105e3111b2e6b8587a5a1f575322713bbb87c08d2f89d3e459ed4c90d28d6d40a77d61d21fed93e3133ecdbe016a5bafedaeda7337b579bb1035611772131cc510117e507dac834f12396f42fafdcd3c31b1d58c295c4a94f998d46a968752b68f2b391ae6f4ed13eef6da4e4d6dc3431391b6e6dbc6beb03a6f8ef95694382c6ba2d54e2aa0f4bf5cc95f5a50a04b585f8bbc4c48ae87f47d498c2853fab486287b56881f5a864df3bfc8846f188ce203b828b9e3e5b182017649e203a04c950127c5558421e18574e3bf6e909b6a555097c5b9a7fbe0cca2d43f76fb2397a98c4d57998d21363edb2edb291fdd42765a8c4ea6976b4f33830e9f03278f875b53155b18b739e7ea9c0aaaf78901044df9d049c7756fc2b39bbc3fd1e37ebce47b118802606286a0f095e37ee630144447245da0aaea1414967b032abd84f3396e63f7505a5c93c55ce067bd5b84d263e6e35f537bbfe3658c3de70bff1c7966ec913f515716d8c9413c2588a7aa7d0743a0df92f795dfc9bb3c95b1661a56670c6135fc49dd04b3a351dca4575d71eeb35a4b72676419c49aa1f925ba00b917cb149d8a51980b0afbef3fbefbbfceea5bdc5526e12a5f2275811f56500a122a397fa45c381a24741da7e5c02ee56fd31a7279cb0b530b7026126e3f58b1d22c809fc1c980088809557892e2e276b5545af90ecfbf68f7b804d2dceb0b57c3b1a9b9b4893314ec3a67f0b7a3f4f49cce28243fd84921d88377fb0594bf45c62ca5afe22aca456c077e48848bcd4a6aecac8c593a8fed315743530d02c0adfd5a76944432364c98aa2cc6855f5cc562e27edd33faf94fae3032bfc3b6fded70e2b227f5024a24186dbfab853a3e604834eebd1e5edb3afb32a68ddcf81604fb2474a572ef709b78e30888faa71bc1ba4415e6e47db1b39814e904794ec7642281f031bab92eeab33c0e09e4f423774cfac9a090b6e6ac2d04a3d059d6365e665e1584f74c2bde3e4e195fcf6cc4234d35cbf0667022f6da5ed39c914c545711cb75efc0a46c00126839857cbeefa41a31a83cdc1a68180d0542d190e6eda6fcddcfa1812e2a35a6fb67cd574c039839c779c273a87ef496eda0a1e2cb4431899de5fd89b40a3aa74d7727699620199b16b46b598a26ab020edbbdbf8faf64f3e72a0415d66bb62c1c862e7c2cd0131457d6b53adbad75702bb8cbc9bcded420c607d9f5fb34d12a3a4aedb74cc7f23b6ac30bff7a721ce7a419ff7d68b8eb44c35666bf8ec151ebfbd89a0cc3383a593248c2462dd994a00f5e0bb3a82c0f0b28b81d373eca4588f50540c1c4d399c809755f95267902404f69f515d410acee299bf8f1f7ddcf756e30c958f180a355b9fee517fed1fb97f98abf0135771a9a599701eca04d27aa8db0b030e899c645d515b152381885d4ad0a32ab26cfa8bbd54645c73da27312f8e482808ca6ac9158aa24d8624879582c7c7723b74625b273471e2ebbc29368a485966201a0a41494106fc8851715aadd6fd566b25802462ba68634e992bea457776ea0a20654b94ed028d3d54f537e20ef63198784a3c4be119b4e7df089afd82c606fcea17b9258ea37a23f2d0d64a235408266928e2ed11aa536c9bfde1455ecae7b4ab323d7f15fbfa14f6bf2b93f4ed59ccd612594cfd69d047c6a624edcd5e36b007d9ef17a05fc08308e7885cbb4c8f7bfb2447c8a317a61df4a91600feaff2f443468d1dcd6ba47dd32c8f21bfc1dc17f067bd7da5f61d4988a5adea07285561cf7316ea0407b7f9e53e54c83822a0ef84cbc484606d07a7122cbb1d2b6ff36ceae0c937585e70cbdd9df77b6c93e68c6eb1d0aa6dda160f43076c7717c3be3e7ea935b8e73ad8e41a29cf24c411", 0x1000}], 0x5, &(0x7f0000001a80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r13, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r17, @ANYBLOB="000000001c00ee000000000001c71c0002000000", @ANYRES32=r18, @ANYRES32, @ANYRES32=r19, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r22, @ANYRES32=r24, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0xb8, 0x1}, {&(0x7f0000001b40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001bc0)="23b30bea08a860cc71717d01fc6bae73c61c1b5c34700342f3a2fea23595d296ad52aa0678b7f86b9d656116c33e9081b7463d5c206a83610248d3004bdbe7e0f29df0f16013c7a7beb489c06f0b8bbf670bd282cfdfee87d3825fa129280b231e48ce15ff5f20119ba3eee10003ea3e39ab0c27e7965912214a7c068e71257a6a6b35ccda9376e13bda3d36dde67202e4d5de9313a7d13b4970b15dc4bdb4", 0x9f}, {&(0x7f0000001c80)="99b3c9dceeccca11ae4dd441a06346824c7a06ecee902894f47f3bc1cca4f6875f7a8fe3cefedf6aa49168980bdafcb6f5a1d9fa2e4ce6e8b19f76143987749c7bb5ffb2dee55740e555fae520763f9e1a985edb4ee59c7aa274294354ff1f77e194c2664fb967d88e429c6aca2422e433404db911da518f5e12cff245d9576470716ed772e50dba1a5493396908bcf0afa45d96f07aba92cbeff722e9360ad37dc07af16fca4249d160304c68c4daedf542348bf2f5dceb28bee8688396a90958b4369563c7e97f5c3332800c0bfe46120d708a3730011ed7688188e1a886db", 0xe0}, {&(0x7f0000001d80)="117264b5067608120c4012c6d402eb4c4e596a24333ef55ea30b99484ab6b753fec8051e67038d3505be1b79b07ff3f2c6a4e545f2b207f3e508cf91e5a5d61e7a28ef1d58fd4aa3fce6adb9e4dccbcdf6eb105feeb92e29d64e17152e8fa5289584576f3dab1afeae960e991f15fbd07b4c49f24aa0bfbf735e17085a836eb73c1b8ce0e02d987f05ab4f5e1e4aa08da79560f248a133802068dd22956ef231e249701cdf79816ad92d3bcc6d532b6129ec0ee7eafc5f6e62f7c7f147769141d2a7d06f", 0xc4}, {&(0x7f0000001e80)="3d94a5df1e1bc9a06964521fc44ab1569397ec8c78e6d8fdea9457636659ec242a96db49b2c5658c253ad7566ae72292c80416b95ea94c8ac568f6d59663349aa6110a99efc33778cc487375ad8807c1e3faed32b0b7c662fe13f6171eaef3ad00ea6272a41bcc869642859b877d082cb64128dc6347c57f5312d7408833d4b30ade23417b9e0c8c6c778d4a399a5e8cbcc8775019eeb1b65f43d827eb9c2496149cd833edf4c2a34dfad1cec8209b70d7b3794fef32d2dfd7be48165aa09875005fd6a59a55d5895aa5cd4420d45f68594caaa1d7bd98d9845ba675cb97d90acb8cfa6494183747ec5f2e2f59", 0xed}], 0x4, &(0x7f0000002040)=[@cred={{0x1c, 0x1, 0x2, {r26, r27, r29}}}, @cred={{0x1c, 0x1, 0x2, {r30, 0xee00, r31}}}], 0x40, 0x88}], 0x2, 0x20) r32 = dup(r1) write$evdev(r32, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r33 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r34 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r33, r34) writev(r34, &(0x7f00000023c0), 0x1000000000000252) 09:35:07 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) chdir(&(0x7f0000000000)='./file0\x00') sysinfo(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x2c, 0x0, 0x500, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff800}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8054}, 0x40000) 09:35:07 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="87f865abf383cc9164f8c22d4474721c6812f0") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x4004556b, 0x100000e) 09:35:07 executing program 1: r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x100000001, 0xfffffffffffffffb}) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 09:35:07 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'veth1_to_bond\x00', 0x2}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xf}, 0x20000357) r9 = gettid() tkill(r9, 0x1000000000016) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r10, r11, 0x1000) r12 = gettid() tkill(r12, 0x1000000000016) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r13, r14, 0x1000) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/net/tun\x00', 0x1, 0x0) r16 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r16, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r18, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r18, &(0x7f0000000080)={0xf}, 0x20000357) r19 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r19, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r22, r23, 0x1000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d80)={0x0, 0x0, 0x0}, &(0x7f0000000dc0)=0xc) r25 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r25, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r25, &(0x7f0000000080)={0xf}, 0x20000357) r26 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r26, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r26, &(0x7f0000000080)={0xf}, 0x20000357) r27 = timerfd_create(0x6, 0x100000) r28 = socket$inet6(0xa, 0xa, 0x2) r29 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r29, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r29, &(0x7f0000000080)={0xf}, 0x20000357) r30 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r30, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r33, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r33, &(0x7f0000000080)={0xf}, 0x20000357) r34 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r34, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r35, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r35, &(0x7f0000000080)={0xf}, 0x20000357) r36 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r36, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r36, &(0x7f0000000080)={0xf}, 0x20000357) r37 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r37, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001580)={0x0, 0x0}, &(0x7f00000015c0)=0xc) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r41, r42, 0x1000) r43 = fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r44, r45, 0x1000) r46 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r46, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r49, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r49, &(0x7f0000000080)={0xf}, 0x20000357) r50 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r50, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r51, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r51, &(0x7f0000000080)={0xf}, 0x20000357) r52 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r52, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r52, &(0x7f0000000080)={0xf}, 0x20000357) r53 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r53, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r56, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r56, &(0x7f0000000080)={0xf}, 0x20000357) r57 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r57, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r57, &(0x7f0000000080)={0xf}, 0x20000357) r58 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r58, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r61, r62, 0x1000) r63 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r63, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r63, &(0x7f0000000080)={0xf}, 0x20000357) r64 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r64, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r64, &(0x7f0000000080)={0xf}, 0x20000357) r65 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r65, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r67, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r67, &(0x7f0000000080)={0xf}, 0x20000357) pipe(&(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) r69 = syz_open_dev$loop(&(0x7f0000001e40)='/dev/loop#\x00', 0x200, 0x0) sendmmsg$unix(r2, &(0x7f0000001f00)=[{&(0x7f0000000140)=@abs={0x1d0db5aa66ffca3d, 0x0, 0x4e22}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000001c0)="210a729e6d2c5c90b5bcdcc3b438508d2791ef27725198a1d39daf9506236c89", 0x20}, {&(0x7f0000000200)="73711cac260cfb80d88ea78ec16b661388cae3544bc2bba7e31a279de80c2f2a6282621d305b8063fbc8cc5a83f4448f0a31b2d544353ee236a5d89359dd7320a0aa87451d44c6acd29c2fcffb70a651e2b71d3c4525074db2157bd24b49c0aeb8729016fdc8cc5884604f881d52e3056a9113041e3f52e968761cb2", 0x7c}, {&(0x7f0000000280)="564b9f37206557e29344b94da09da0cf1c4e608fb45d9c178b50bcc2b4e1a25359de429d74df4117a0b02798b7aaba30a7d2b56703e02ddebfaea337d9f17cfb7905d93ed3dcf79d3035d727a8d1dbf6d221e2c06d", 0x55}, {&(0x7f0000000300)="a6af31c97b8da3f66db832119045d29bf9b7dd7f362fee0c1e62631ac9d2abf2e1a2b8931d889bf2aed237235c2c69039045d270b2db15137a4993b8bc7ccf35ee53a1da61ac87923fb89a4dbb27bf1d2b3ff176", 0x54}, {&(0x7f0000000380)="f1d274022a1a298caaf81b1088cf1ad5dd19fdf01eeddb2f5590adec9903686f0f038c11aa1f6ff95474bf021f58c9f9c15484f03f9c0b8d401e06eab87b8715d8b16e6f1b5d5876d5bb186d0c13a537f3f18b23f2169f6f", 0x58}, {&(0x7f0000000400)="8e1018e6a1d072a98b2bef", 0xb}, {&(0x7f0000000440)="c3ec27e5373ee57b7bfce28cca47ac93042929ed8d0e4f46318d579a0b6d26b6dacd418b399f3432aeb7eb34949e4793af9cbf4ee53d602b4f9cf15efb4c4d375fe2556d825020844d1c3dcc940109b9975126e9b7e2e0c54ab88520c2a037b40faba5310e7192eb234f47ec561f816b6e57f09540943c16e5176ba692c891fbe79de38bc507c72cdbd96814a912539f1e9e76a39fc765403ccfdda222f31d09dcd67a2b97b101ca8f40a05fbad0e5696ead546115f7abc5058c4e88c0c079dfeb96d058228c46eb8275a8bdd02c6a792d036791e1c3", 0xd6}, {&(0x7f0000000540)="1f68458b5ec63523382d88a188b73f3b34d08c4bb9d9dad083e5c79007eac7fd233ef8374cde519d58e32169f659c2701d31d14934f6a3a85f1bf6e1a7e5365e321a1fd1ef4efa4619", 0x49}], 0x8}, {&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f00000006c0)="8b833a9c40cbf053d3f130fc25b971ac3d93b776eed311c4522ee17c192ff60b221f3cd3adacf229301895095413dacb5a3539a48c55faff04b7d76537435cdbc9a23abed8b74bcd84fe401a128eca86bc90b51bbe553e838966c130bec48b5da0fe994dbe99d6200d66f94e5067f13142bdd3f96ee16ee7f48e17c0b955b05b86be1f2df35a6a3266c2c70b264071e9b0e95a973cb0aab429c40924bd06833438a0c135162d643a", 0xa8}, {&(0x7f0000000780)="cdcfddc83d68566fc6e36d236c4a7bf27515afbe7ffa798ab43e5eeab5d864d2f5e10cb4e165e404c4ed412bd466a26ffe89f2e78ad9055c4e82c7514042896b63ab7f74c0db6839ba4f72b62a5f2f6d0030d120834fb0806c", 0x59}, {&(0x7f0000000800)="c60faaf597a747306fe07e75c5c033e28fc23ba43b8a36d2584e0d0560021ac341bb28f1cda3ff6735f09e9a39b63a7639d6c41cbe3241a1e91ba067c7fb27616725bb92a5a6c27dfc10fb51f1a90d4be91417aeddda617307e7e7df520c1d518ad1c1c6a4862c46dc7e254bb58b8a2dd72ac7fd4b74391fd4110807", 0x7c}, {&(0x7f0000000880)="a40e1fa89dc366ea6422ed71e26f74dfb18ab3d2311efcbb800525c7ce7202e243734625aba60749cc8afb657b9a9e2ad6768d3f7ff743737d90a3a9923fa4868f178a5458c8f041467080c509ca559d19ba9b42d27f494221ac8d2aea90137502ec4d468d05cfe21573d1c488d1f640977dabbcb66fca3c6037efe8b1582294fd14f19553a62eb873a83a8febb43c", 0x8f}], 0x4, &(0x7f0000000980)=[@rights={{0x2c, 0x1, 0x1, [r6, r0, r2, r7, r2, r8, r1]}}], 0x30, 0x4002000}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000a40)}, {&(0x7f0000000a80)="94253a5158509ad3d680e66d0244e6d20d0e5a7e0dfb82a469da17404064df1144accd999ed03cad93cca6b79a2a695da4f01f5793d2265876a49eae246b913f52765fcbd964802dc2d8207cff1d8cca", 0x50}, {&(0x7f0000000b00)="c85d81e90cb4a157d1f72d999d2036da8f959dd77e8ae827f1a50f6c5ed045bf69a0602cdb771a7329df71d3ab52aa1ddb9857b910c2776b267e0f3eddad1dc5c56b4786449b9686425baf5aa11fbe2ca75dcdc37dd01f60417e98da8c81281792fcd816f575eadee9e0df4c55637b5ae58015c69e95c14d0f029e4064f6f854663c6bb622f76aa503016e1c92bd9c77032eb22ca9492d87", 0x98}, {&(0x7f0000000bc0)="5e689b7d89b6f8857183e93c6ec6b95a15006a05466bebbe8be54c9745fb6e97270afc7d9b233a42da276385d4348aab341166ae5016cd86f64771d19115aff9663dad3d13b15315d7ac3c3dcb7b0a84c245d7eca38b43ce24a59d2043cd5c160873218e4dc1e9e9635111af13cb87b7b132cb9ae5f487b836ad69f0660b48023294fbdef8f26c73b2b2054caa5bacc68168a4e18d883a90a2932eb16b7365122b7dcbf97b1c30f1407a8b83d07d2bebaf69669f24b9abfe84aeb9d2038d643e17fb86c57f5721fec28c6b9806aaaf804dc60f44abc69dd7", 0xd8}], 0x4, &(0x7f0000000e00)=[@cred={{0x1c, 0x1, 0x2, {r9, 0x0, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r4, r14}}}, @rights={{0x20, 0x1, 0x1, [r15, r16, r17, r18]}}, @rights={{0x28, 0x1, 0x1, [r19, r1, 0xffffffffffffffff, r1, r2, r20]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r24}}}], 0xa8, 0x5}, {&(0x7f0000000ec0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001200)=[{&(0x7f0000000f40)="6fe1bce724695c56bb240341eb9e5b324be528f31de78286a92e2ace04ba3424266cd3fc218a4bc3ae62ca0737f75fd8e353569b0c842432d4d17fd1e5f92a904d90d5311bed15cfe665d2b68cf06e87824f80aefb739cdf645e8a91189740506daad71dc2a8bb3fbff2a1afb0f2c3c3c017f0aed55e3a968b6cda3bf043fc74d8", 0x81}, {&(0x7f0000001000)="6e575e7010022188dd4e8e9adaefc5619330793a225e4f9f1a6e64cbcb1fde5f7e0d90afd447e1069126b473659c150b5a54ef355d0713e1b7dcd44b267a6a8330063503464e530185cadafc42fc1104c00c6734d5260f1e3b8280817b165ec9be037b3d83ada0bcd3f7bfb6d7719bb5185dec178f1356", 0x77}, {&(0x7f0000001080)="1cf7ac271f90710a05b83d50a8470008393b3c98709be158c531be7dd59f12011f5ac78dd021320d9a4ad904c764f3dd253de23296df86f50ceb46c34601e7dfb27fff10d7c3066a1b8c6c6046bfeaa47f86725307a61915ebeba1f0ff1260d7a1735ff380eaf9c25f691384a8d845bd9260b2921978ddfc6c29a31b9a", 0x7d}, {&(0x7f0000001100)="85090c3682d8afda349221ea5903343f063c0c37e51a0fbe36634128daae49b4302ce981dac34d8c004633922f326eb6d86726eec901b27b5a4a9ead480aa0cf4fcfebca9311b4a9ecd08e90ea6876dc3a1ecb6ecb9076fd8e2ad290dfd625bf2a0edaa1b91f36ae2e0541212528e88b75cf4d3e57c2e4af1d8c6e9dd610941d8af2755752a13911164a2631bb0780ad506fdd2e1ad79797ccfce21606aa43dfb261b351177cba8d71a2b3d6f1689ea71e3f2b4d7e86d4970fcf32e414604a11480f4b53e792a1a9ef8b0cea98934e49abe5f89e7dc1bfbb2b0356a0cfe5398826ef672f3b2c0f766ca6", 0xea}], 0x4, &(0x7f0000001600)=[@rights={{0x34, 0x1, 0x1, [r25, r26, r27, r28, r29, r30, r31, r2, r32]}}, @rights={{0x30, 0x1, 0x1, [r33, r34, r35, r36, r2, 0xffffffffffffffff, 0xffffffffffffffff, r37]}}, @cred={{0x1c, 0x1, 0x2, {r39, r40, r42}}}, @cred={{0x1c, 0x1, 0x2, {r43, r4, r45}}}], 0xa8, 0x8000}, {&(0x7f00000016c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000001740)="d7c95b57323ca5443b1272117b60fb3259cc7535d96ff535f6b620dd91454963a599411fbe5d7a5e3ea4282e2d156754d0dae974d2ccfab5546ddda025", 0x3d}, {&(0x7f0000001780)="2e6121428fe8d386f8e6143ac943c91d011d1ed756cdea7c23d97608da51db222b3ac283f2939541191f58a0ce479f6b6df1ae74619c73acb0e824add670c9ccf806751189ce74d61b4df7e1846f568cf509b9393d8936a2918d5bd931297b879309ed8a3ee2e38b5d678aaa161686ef0c44384666a74364c216abb989d118aac612f843648cc8408dc7d920", 0x8c}, {&(0x7f0000001840)="8c3b23fed2d6c939c7daa50fe2e2f54d0757a44dfacf60ca64932f8e0b87419d7356527a0aaadbc053391f6e83753f09678dba81180e71c6b98a7378573c96c785bf2aaeb9d585f494bb2eb1e43da34f70a1eb623e362ea39ffe3f5f3f10ca6e0be9eb065e3674b2bcee8cb88725401706f7f8f4e8ce105bf51e63c79a55f368ca71cb2bb697bb4cb7249342c8059d8dbb17", 0x92}, {&(0x7f0000001900)="6aeb54bdb1990c9b0e54b1674aa83026e61740da95ffea63258f3794e54922548b2252570cd4f320a5c23074aa885a79897f62d01629317873cc2323921921b4924d5360076ef758af587e73a48c2f485233c8f43c2724957408b4acc490d8fd01f778349827d229fb087dfb56082fea10c151ec357b7849acf5505aa904cc5296bcbef9de22e9c6680c2bad11828eecdcc3f37155d953ed5ee44d", 0x9b}, {&(0x7f00000019c0)="d3672c93e8307aa01d8eab39b03b7393f5bed7da6df90bba2fe90d7d8cce50aca65323eebe51848f826afe5ce9953316a8266607c82265293263df5683071729245c8d0fee08c7860f7e5a33df179d3749f3a4c1b78d75a22106da25304093cd225ef33d0088c997a4be2901cfe6878c76a60b5f214a74d1769de057b856008bc8ef8360767e7fbd2d17798de4086ecfbdf42186d7a7c4e974181a504e5fd6cbcbea615c065bb62b64fbbc3dea2540b1f177817dca77397e76d1aa8b7aa9ad671021dbe775e11394c7f3dd1474229d7204399975a3291dbdd4a999c4d47501cc19b9b884", 0xe4}], 0x5, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4, r5}}}, @rights={{0x20, 0x1, 0x1, [r46, r0, r47, r48]}}, @rights={{0x34, 0x1, 0x1, [r49, r50, r51, r52, r53, r54, r55, r56, r57]}}, @rights={{0x18, 0x1, 0x1, [r58, r2]}}, @cred={{0x1c, 0x1, 0x2, {r60, r61, r5}}}], 0xb0, 0x20044089}, {&(0x7f0000001c40)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="777b5d3a73916fa76c7c5caf133d480463629c687a68f451eaf240c450a56157e04c18c0ac8fb62b7cd17243e2fbdc779572f334de6c2badd72f182619a031700d94224bd6e990a744d2278e78ad5f21e39e273e0c8c164cfc3b17958462ed82c78bd85dab", 0x65}, {&(0x7f0000001d40)="19f82596cef3db4d6c56d9dcd21db17533e2e11090cbc090b4cf9613ba", 0x1d}, {&(0x7f0000001d80)="63f3d19844b86f99cc7c3570665854965e0158912d633940c25bb165", 0x1c}], 0x3, &(0x7f0000001e80)=[@rights={{0x18, 0x1, 0x1, [r63, r64]}}, @rights={{0x20, 0x1, 0x1, [r65, 0xffffffffffffffff, r66, r67]}}, @rights={{0x18, 0x1, 0x1, [r68, r69]}}], 0x50, 0x48010}], 0x6, 0x40000) ioctl(r1, 0xc0084907, &(0x7f0000000080)) 09:35:07 executing program 1: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000001000010500"/20, @ANYRES32=0x0, @ANYBLOB="00000000070000001800120085278f13c0796d37259c839fcc746608000100767469000c00020008000100", @ANYRES32=r2], 0x38}}, 0x0) [ 128.113101] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 128.157173] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 09:35:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca570286f7dc47bf070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)="1e90456b90e13274f7e7440480977b04b76e462e499e7b85146988246ee1f8826e5082aba27ff2195536327e6b1ce3ddea41e9189d049531d0e2c1c5e9242eef713a219ec12b9b704563838c310e8c7e5380284894f2b6dcd3669d9ddc2292d66374b5a0855afee38689f42ef27ca44e4fe3e386924ee0337dd42cc854752e156972d7fced4e9cc3701db6d9f424babdd7036da23975fced95652a31372b393e363ae9e11362f6adba33119a6439111194b6f33b39f14a877d1602b736510487167d7003895bca2b69e933c7100b567c2dc4f316fde2", 0xd6, 0xffffffffffffffff) keyctl$get_keyring_id(0x15, r1, 0x2) 09:35:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="f9be9f303b22290399071bb3ba01d28e6c0f3757eecbc624877c825255f910c28f5e87a64820548e39808e0400a0ac073d90d86da58a5d5ab066f24351ed", @ANYRESHEX, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b12b1894ef983d0cfc", @ANYRESHEX], 0x0, 0xf8}, 0x20) tkill(r1, 0x22) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socket$nl_xfrm(0x10, 0x3, 0x6) ptrace$cont(0x7, r1, 0x0, 0x0) 09:35:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r0) socket(0x200000100000011, 0x800, 0x1) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0xfdef}]) 09:35:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x41) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmsg$key(r1, &(0x7f0000000000)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="02845d2ecc3430ade85a1100000007002c00001a000017a667beda8e4c61a068449b9dc42c5b172009ad72034b49db3817e0604fe1c0cd6af644d1e37e74b0480b79ee7acc1a78b6f86d0c2144e7f14f40afffff7260d74fb1b6a176c0dbe1aca1442c9a2d58020fe23d9843d61878530f648420705468b886a8dec93a9ee0cffa5c31ecadfd9f8664d181096160c493b8d4f1dbdcc97ac3a228856d46b9b1a7d06c5435aeca270bb606708673a2a5d3006849ac1e3e2c03731d04a018a68b19239ee25934f8d28cc1ce808b14def3b2d1ff68ec9cfcd7a1"], 0x2a1}}, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000880)) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='./file0\x00') write$uinput_user_dev(r0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) r3 = getgid() getresgid(&(0x7f0000000340)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000ac0)=[0xee00, 0x0, 0x0]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) socket$inet6(0xa, 0x5, 0x80000001) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r9, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r9, &(0x7f0000000080)={0xf}, 0x20000357) fstat(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) listen(r8, 0x7ff) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8000, 0x0) r11 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) write$P9_RWRITE(r12, 0x0, 0x0) fstat(r11, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) listen(r12, 0x7ff) r15 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r15, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r15, &(0x7f0000000080)={0xf}, 0x20000357) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r15, @ANYPTR64, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_id=', @ANYRESDEC=r14, @ANYBLOB=',default_permissions,default_permissions,max_read=0x0000000000000005,max_read=0x0000000080000001,allow_other,allow_other,blksize=0x0000000000000200,subj_type=memory.events\x00,subj_user=./cgroup.net/syz1\x00,permit_directio,euid=', @ANYRESDEC=r13, @ANYBLOB="1200"]) r16 = getgid() setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02080000010006000000000002000400", @ANYRES32=0x0, @ANYBLOB="040017fe0000000008000400", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000500", @ANYRES32=r16, @ANYBLOB="10000000000000002000040000000000"], 0x74, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f00000003c0)) ptrace$setsig(0x4203, 0x0, 0x8b66, &(0x7f0000000200)={0x41, 0x5, 0x6}) sendmsg$nl_route(r17, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(0x0, 0x0) 09:35:09 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) r2 = syz_open_procfs(r1, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000040)={0xf, 0x1f, 0x1}, 0xf) ioctl$RTC_VL_CLR(r2, 0x7014) sync_file_range(r0, 0x5, 0x7, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, &(0x7f00000008c0), &(0x7f0000000900)) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000ac0)=[0xee00, 0x0, 0x0]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) socket$inet6(0xa, 0x5, 0x80000001) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r9, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r9, &(0x7f0000000080)={0xf}, 0x20000357) fstat(r9, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) listen(r8, 0x7ff) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8000, 0x0) r11 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$null(0xffffffffffffff9c, 0x0, 0x103d05, 0x0) write$P9_RWRITE(r12, 0x0, 0x0) fstat(r11, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) listen(r12, 0x7ff) r15 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r15, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r15, &(0x7f0000000080)={0xf}, 0x20000357) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x8000, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r15, @ANYPTR64, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_id=', @ANYRESDEC=r14, @ANYBLOB=',default_permissions,default_permissions,max_read=0x0000000000000005,max_read=0x0000000080000001,allow_other,allow_other,blksize=0x0000000000000200,subj_type=memory.events\x00,subj_user=./cgroup.net/syz1\x00,permit_directio,euid=', @ANYRESDEC=r13, @ANYBLOB="1200"]) r16 = getgid() setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="02080000010006000000000002000400", @ANYRES32=0x0, @ANYBLOB="040017fe0000000008000400", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r14, @ANYBLOB="08000500", @ANYRES32=r16, @ANYBLOB="10000000000000002000040000000000"], 0x74, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f00000003c0)) ptrace$setsig(0x4203, 0x0, 0x8b66, &(0x7f0000000200)={0x41, 0x5, 0x6}) sendmsg$nl_route(r17, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) pivot_root(0x0, 0x0) 09:35:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r3], 0x1}, 0x1, 0x0, 0x0, 0x44}, 0xc000) setxattr$security_evm(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000300)=@v1={0x2, "bdcb5299c23a"}, 0x7, 0x3) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYRESHEX], 0x0, 0x55}, 0x20) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 09:35:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x402c542d, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r1, 0x66, 0x13}, &(0x7f0000000240)=ANY=[@ANYBLOB="656e633d6f61657020686173683d73686132353600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e27f16588f632e1e5b25473df41d55d535dfc330eff9e782de53e87c72e1db50a20ae49fb538d33ae85039885c65102e9ed7b353a0cf423505260344e58e71da39d0231bef5e6f742aca1b7731918a4ce48fb393731da52bf08c9695f3eed0b97bf440a2c6c02045ceb27c59e1325eb0b2e685c3c632d5044ecdcf22da679502023418ef5c6201b47d0f41125d1b8a9da067"], &(0x7f00000001c0)="fc49fe6fabe34e1c0a87a81ba426b5ccf8cca0c0c70f636efade4e3afd4e22b85d644f78dc3483e000674d05e882a63de7ef8f78a304be36fa90e30f4198ac0ca09a6753e0e019aedb26e575ba95614c45cb864b774edde0953c8d63aa8645107c8a45fdcca0", &(0x7f0000000140)=""/19) 09:35:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4420a94}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=@newtaction={0x140, 0x30, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{0x12c, 0x1, @m_ife={0x128, 0x1a, {{0x8, 0x1, 'ife\x00'}, {0x4c, 0x2, [@TCA_IFE_METALST={0x34, 0x6, [@IFE_META_TCINDEX={0x8, 0x5, @val=0x4f88cde2}, @IFE_META_PRIO={0x8, 0x3, @val=0x3}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x83}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x6}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x81}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @TCA_IFE_TYPE={0x8, 0x5, 0x9}]}, {0xcc, 0x6, "55a865a6085135ac69c42dccb7b06cd0a2d8c3e587076f08a9f5f39782a3858400dca5f5ca39302207593d155cb363a3334c50907da7b5344e5ba33b8e916f811e070995d2f7e918c227fc7c3093e4baa65e0b995ba11c7fe3636d919c3a2b74727abdb97c88ab6a24c4987ab22beb1ec753bf7c0fd30f0192be5272e0ba6caf444af5bbbff8ae9c3a75c2c2f0916aa000c991fcac785027ac9c07f653afe527c71fb83e994c77464ef14f8d88d61f95a2c066876af12d0f295c58ab291e8a1f890c6d34c1"}}}}]}, 0x140}, 0x1, 0x0, 0x0, 0x40010}, 0x8088000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="6dae718600f0fff8a70a7a005c0ef3e0997f84cd15c0010082919b615206f488458998e192b1870b85c9e8a554ef30d4dd35d51cf34dd9d3d80e556fdb00f0ffffffffbfff6116bf1ca0bdf7a45c12734fb3e731f3760349355e2f2f13ab700066312b887aaeb6657e158fb9897f55fe245cb6e8ebf2a49bd830c06a1b2ecb8706613dfa53a08cc0ab550a2b47b490af76634e71a0000000040000f36ccc5e00000000a4feb4fa00daad51c66bfeee411a5acc07cfc05d477498346cd57ec6d95925fce71c098fcb8871b42fe8790e16b72d8f59df8d6b6fd9de718b7721293e02723f961267733741028fff23cc3d8b7cd53ded54302313c3c3286c7f687cba19355714a2904a33ef7a9a000000000000000000"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/173) 09:35:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f00000001c0)='./bus\x00', 0x1008, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x40000000002, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18}, 0x71) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) splice(r0, 0x0, r2, 0x0, 0xffffffff, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) read$FUSE(r2, &(0x7f0000000640), 0xffffffef) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) 09:35:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x0, 0x1000, 0x101, 0x6, 0x2, 0x9}) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000040)={'team_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) io_setup(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0, 0x2}, 0x20) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 09:35:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca5265e0bcfe47bf070") sysinfo(&(0x7f00000007c0)=""/154) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x1, 0x1, 0x3, "294c75cc9abf04b13c2ffe79feb4a1b7dbbe683b9b617f6f77b5e102c647551fb32602697b594f11f7a8e3ad6377836584230633a8380b3d964a8ccbe6f4ec7a84128069acc7313c26774931a3dbd3b6e4f1c8047cce49fee9bad6144b8bdb648672087c90169c04ae3b96ecbdef22b842250a2c44a9c06a8993239259df3f4bee499046da00f92551ddc87c84dbd9d43cac3c4c6fb01a6c1d0ea4ef41cce0"}, 0xaf) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 09:35:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4420a94}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=@newtaction={0x140, 0x30, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{0x12c, 0x1, @m_ife={0x128, 0x1a, {{0x8, 0x1, 'ife\x00'}, {0x4c, 0x2, [@TCA_IFE_METALST={0x34, 0x6, [@IFE_META_TCINDEX={0x8, 0x5, @val=0x4f88cde2}, @IFE_META_PRIO={0x8, 0x3, @val=0x3}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x83}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x6}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x81}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @TCA_IFE_TYPE={0x8, 0x5, 0x9}]}, {0xcc, 0x6, "55a865a6085135ac69c42dccb7b06cd0a2d8c3e587076f08a9f5f39782a3858400dca5f5ca39302207593d155cb363a3334c50907da7b5344e5ba33b8e916f811e070995d2f7e918c227fc7c3093e4baa65e0b995ba11c7fe3636d919c3a2b74727abdb97c88ab6a24c4987ab22beb1ec753bf7c0fd30f0192be5272e0ba6caf444af5bbbff8ae9c3a75c2c2f0916aa000c991fcac785027ac9c07f653afe527c71fb83e994c77464ef14f8d88d61f95a2c066876af12d0f295c58ab291e8a1f890c6d34c1"}}}}]}, 0x140}, 0x1, 0x0, 0x0, 0x40010}, 0x8088000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="6dae718600f0fff8a70a7a005c0ef3e0997f84cd15c0010082919b615206f488458998e192b1870b85c9e8a554ef30d4dd35d51cf34dd9d3d80e556fdb00f0ffffffffbfff6116bf1ca0bdf7a45c12734fb3e731f3760349355e2f2f13ab700066312b887aaeb6657e158fb9897f55fe245cb6e8ebf2a49bd830c06a1b2ecb8706613dfa53a08cc0ab550a2b47b490af76634e71a0000000040000f36ccc5e00000000a4feb4fa00daad51c66bfeee411a5acc07cfc05d477498346cd57ec6d95925fce71c098fcb8871b42fe8790e16b72d8f59df8d6b6fd9de718b7721293e02723f961267733741028fff23cc3d8b7cd53ded54302313c3c3286c7f687cba19355714a2904a33ef7a9a000000000000000000"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/173) 09:35:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4420a94}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=@newtaction={0x140, 0x30, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{0x12c, 0x1, @m_ife={0x128, 0x1a, {{0x8, 0x1, 'ife\x00'}, {0x4c, 0x2, [@TCA_IFE_METALST={0x34, 0x6, [@IFE_META_TCINDEX={0x8, 0x5, @val=0x4f88cde2}, @IFE_META_PRIO={0x8, 0x3, @val=0x3}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x83}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x6}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x81}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @TCA_IFE_TYPE={0x8, 0x5, 0x9}]}, {0xcc, 0x6, "55a865a6085135ac69c42dccb7b06cd0a2d8c3e587076f08a9f5f39782a3858400dca5f5ca39302207593d155cb363a3334c50907da7b5344e5ba33b8e916f811e070995d2f7e918c227fc7c3093e4baa65e0b995ba11c7fe3636d919c3a2b74727abdb97c88ab6a24c4987ab22beb1ec753bf7c0fd30f0192be5272e0ba6caf444af5bbbff8ae9c3a75c2c2f0916aa000c991fcac785027ac9c07f653afe527c71fb83e994c77464ef14f8d88d61f95a2c066876af12d0f295c58ab291e8a1f890c6d34c1"}}}}]}, 0x140}, 0x1, 0x0, 0x0, 0x40010}, 0x8088000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/173) 09:35:12 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) ftruncate(r1, 0x208203) fcntl$setstatus(r0, 0x4, 0x6000) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) fsetxattr$security_smack_transmute(r2, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x0) write$input_event(r1, &(0x7f0000000080), 0x18) io_setup(0x2, &(0x7f00000004c0)=0x0) r4 = gettid() syz_open_procfs(r4, &(0x7f00000001c0)='\xbb\xce\xfc)nnG ') ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000140)=""/53) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4608140900000100000000000003003400000002008e824f000000000040000000000000000d02000000000000a20000000400380001000500080038d605000000040000000900000000000000070000000000000000010000000000000100000000000000ff7f000000000000ffff0000000000000000006009000000ffff0000000000000004000000000000080000000000000005000000000000003f000000000000000900000000000000359150653971cf4b74"], 0xb9) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0}]) 09:35:12 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0xfffffffffffffe24, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e630c40588e00002a0fea8cf74506cfae1885a131eaf9deccbb3d215f32d2afd30a391e081e41cdefe9bdcbb45286e754bb18da094b6cae447af26596e94c626c2e4ee2540b280e255a53f886d8434059f21777a4f4194270e6af77b45f13b7b953fb1f8cd07981953e99fedc5c11d164b612b67241b2194f254eec920693d08b5a424dec586d3b29cd584153394e3c85e5af313fcbd18c214b48e4d774b48dc892499cd358449c8c3306b8420f7310989a0c75b7ea7626813c02"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4c, 0x0, &(0x7f0000000240)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000180)={@ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/9, 0x9, 0x2, 0x2}, @fda={0x66646185, 0x9, 0x0, 0x3b}, @ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/127, 0x7f, 0x1, 0x3}}, &(0x7f0000000200)={0x0, 0x28, 0x48}}, 0x280}], 0x0, 0x0, &(0x7f0000000680)}) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x30200, 0x0) 09:35:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000280)="28bca274769e62eba734da0095e0612687463915e30702a9c8aea872943afd874e2f98b579a7186270146d0e02000000480004000000760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0x0, 0x4, {{0x10001, 0x8, 0x0, r2}}}, 0x28) 09:35:12 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x82) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) execveat(r2, 0x0, &(0x7f0000001180)=[&(0x7f0000000980)='/dev/vga_arbiter\x00', 0x0, 0x0], &(0x7f0000001340)=[&(0x7f0000001200)='/dev/vga_arbiter\x00', &(0x7f0000001240)='/dev/vga_arbiter\x00', &(0x7f00000012c0)='security\x00', 0x0], 0x1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002500)=""/73, 0x49}], 0x1, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, &(0x7f0000003780)={0x77359400}) r4 = memfd_create(&(0x7f0000000e00)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05\xc4\xc5bZ\xe8\xf8\xe5\xde\xb5\x7f3\xc8\x1e\aY\xcf\x15ug=5\xfd\xdd\xd1Gt\xfbI\x97\"\xe8\xca:h\x01\x89\xc6\x89Yj\x80\xf2\xea\xf6\xe6\xc7\t\x1c\xe9x:\xa2\xf2\x8e\x0ep\x98\xf1\\\x90\xd4#\xbb\x0e\xcf\x9f\xf8d\xcf%vD7\xaeN\xf11\xda\xb6\xbf\xe7\x80)\"i\xa6\x111\xc7\xb6\x9b\xa0c\xd4\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20002000006) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) recvmmsg(r5, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000003a80)}, 0x8}, {{0x0, 0x0, &(0x7f0000003dc0)}}], 0x2, 0x2000, &(0x7f0000004380)={0x77359400}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev}, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000280)=0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @dev}, 0x0) r6 = getpgrp(0x0) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x3, 0x0, 0x4}, 0x7}}, 0x18) getpriority(0x2, r6) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000007c0)) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x240}, {r0, 0x1000}, {0xffffffffffffffff, 0x3000}, {}, {}, {}, {}, {}], 0x8, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000006940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x10) [ 132.879345] binder: 4115:4118 ioctl c0306201 20012000 returned -14 [ 132.893395] binder: 4115:4118 BC_REQUEST_DEATH_NOTIFICATION invalid ref 36440 [ 132.909502] audit: type=1400 audit(1567935312.425:19): avc: denied { call } for pid=4115 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 132.944059] binder_alloc: 4115: binder_alloc_buf, no vma [ 132.949634] binder: 4115:4118 transaction failed 29189/-3, size 112-24 line 3284 [ 132.960180] binder: undelivered TRANSACTION_ERROR: 29189 09:35:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./bus\x00', 0x0, 0x110) write$P9_RRENAMEAT(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioperm(0x0, 0x0, 0xfffffffffffffffc) r2 = dup(r1) readlinkat(r2, &(0x7f0000000000)='./bus\x00', &(0x7f0000000340)=""/198, 0xc6) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r3], 0x1}, 0x1, 0x0, 0x0, 0x44}, 0xc000) setxattr$security_evm(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000300)=@v1={0x2, "bdcb5299c23a"}, 0x7, 0x3) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000840}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYRESHEX], 0x0, 0x55}, 0x20) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 09:35:14 executing program 2: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000329bd7000fbdb08000d0000002800010008000100020000000c0007002000000008000000080004004e200000080009005200000008000500ffff00001c00030008000500ac141411080008000400000008000500ffffffff0800040080000000"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 09:35:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) write$binfmt_elf32(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="4ef27f454c4600006032006c000000000000345c0107230503000000000057616a07e5a9f2e1000000000000000900608c2ae0c0e7141056"], 0x38) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb) 09:35:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4420a94}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=@newtaction={0x140, 0x30, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{0x12c, 0x1, @m_ife={0x128, 0x1a, {{0x8, 0x1, 'ife\x00'}, {0x4c, 0x2, [@TCA_IFE_METALST={0x34, 0x6, [@IFE_META_TCINDEX={0x8, 0x5, @val=0x4f88cde2}, @IFE_META_PRIO={0x8, 0x3, @val=0x3}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x83}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x6}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x81}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @TCA_IFE_TYPE={0x8, 0x5, 0x9}]}, {0xcc, 0x6, "55a865a6085135ac69c42dccb7b06cd0a2d8c3e587076f08a9f5f39782a3858400dca5f5ca39302207593d155cb363a3334c50907da7b5344e5ba33b8e916f811e070995d2f7e918c227fc7c3093e4baa65e0b995ba11c7fe3636d919c3a2b74727abdb97c88ab6a24c4987ab22beb1ec753bf7c0fd30f0192be5272e0ba6caf444af5bbbff8ae9c3a75c2c2f0916aa000c991fcac785027ac9c07f653afe527c71fb83e994c77464ef14f8d88d61f95a2c066876af12d0f295c58ab291e8a1f890c6d34c1"}}}}]}, 0x140}, 0x1, 0x0, 0x0, 0x40010}, 0x8088000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/173) 09:35:14 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="6261793bc484a4682e0e8eb50ef1f0c0df50da392aab7e2965e1f017112a46650db07c431c5db1ad75e146382f6b465b6e0db77dc4f425ffd2abd27770b79bfee188aec45259b9196b1b1efa81e1c4223e3e38d3ac4d986814dc7e5314e155f403fe44d34d6500af0885e1e147c51d86254afd84dae8b239799a8b8f"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRESDEC, @ANYRES64, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402c", @ANYRESHEX], 0x0, 0x6c}, 0x20) set_thread_area(&(0x7f0000000140)={0x7ff, 0x20001000, 0x1000, 0x0, 0x1f, 0x3, 0xffffffff, 0x7f, 0x1}) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:14 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x82) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) execveat(r2, 0x0, &(0x7f0000001180)=[&(0x7f0000000980)='/dev/vga_arbiter\x00', 0x0, 0x0], &(0x7f0000001340)=[&(0x7f0000001200)='/dev/vga_arbiter\x00', &(0x7f0000001240)='/dev/vga_arbiter\x00', &(0x7f00000012c0)='security\x00', 0x0], 0x1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002500)=""/73, 0x49}], 0x1, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, &(0x7f0000003780)={0x77359400}) r4 = memfd_create(&(0x7f0000000e00)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05\xc4\xc5bZ\xe8\xf8\xe5\xde\xb5\x7f3\xc8\x1e\aY\xcf\x15ug=5\xfd\xdd\xd1Gt\xfbI\x97\"\xe8\xca:h\x01\x89\xc6\x89Yj\x80\xf2\xea\xf6\xe6\xc7\t\x1c\xe9x:\xa2\xf2\x8e\x0ep\x98\xf1\\\x90\xd4#\xbb\x0e\xcf\x9f\xf8d\xcf%vD7\xaeN\xf11\xda\xb6\xbf\xe7\x80)\"i\xa6\x111\xc7\xb6\x9b\xa0c\xd4\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20002000006) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) recvmmsg(r5, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000003a80)}, 0x8}, {{0x0, 0x0, &(0x7f0000003dc0)}}], 0x2, 0x2000, &(0x7f0000004380)={0x77359400}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev}, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000280)=0x4) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @dev}, 0x0) r6 = getpgrp(0x0) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x3, 0x0, 0x4}, 0x7}}, 0x18) getpriority(0x2, r6) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000007c0)) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r7, 0x401054d6, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x240}, {r0, 0x1000}, {0xffffffffffffffff, 0x3000}, {}, {}, {}, {}, {}], 0x8, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000006940)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x10) 09:35:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000000)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) write$apparmor_current(r2, 0x0, 0x0) 09:35:15 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x24001000, 0x0, &(0x7f00000001c0), 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f00000002c0)=""/186, 0x28a) getdents(r4, &(0x7f0000000140)=""/2, 0x769) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) r7 = dup3(r5, r4, 0xc6ee1888ee523882) write$FUSE_INIT(r7, &(0x7f0000000480)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x8, 0x1, 0x8, 0x3f, 0xfffffffffffffffc, 0x7}}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000006e8e0000cb7f5000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x6b, &(0x7f0000000180)=""/107, 0x41100, 0x2, [], 0x0, 0x3, r5, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x9}, 0x10}, 0x70) getdents(r4, 0x0, 0x0) 09:35:15 executing program 0: clone(0x4041c0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14, 0x80800) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001500)={0x0, @loopback, @multicast2}, &(0x7f0000001540)=0xc) sendmsg$nl_route(r5, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=@newneigh={0x68, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, r6, 0x8c, 0x2, 0x2}, [@NDA_PORT={0x8, 0x6, 0x4e21}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0xffff, 0x8001, 0x800}}, @NDA_IFINDEX={0x8, 0x8, r7}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_PORT={0x8, 0x6, 0x4e20}, @NDA_PORT={0x8, 0x6, 0x4e22}, @NDA_MASTER={0x8, 0x9, 0x9}, @NDA_VNI={0x8, 0x7, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x20040000) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xd764e505266aa328}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@ipv4_getaddr={0x60, 0x16, 0x8, 0x70bd2c, 0x25dfdbfd, {0x2, 0x18, 0x0, 0xff, r6}, [@IFA_FLAGS={0x8, 0x8, 0x20}, @IFA_BROADCAST={0x8, 0x4, @loopback}, @IFA_BROADCAST={0x8, 0x4, @multicast2}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_LABEL={0x14, 0x3, 'erspan0\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x9, 0x1, 0x2, 0x1ff}}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) ppoll(&(0x7f0000000280)=[{r2}], 0x1, &(0x7f00000002c0), 0x0, 0x0) 09:35:15 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf8!U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1ey\xc6l0\x98\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x140d2) ioctl$FS_IOC_GETFLAGS(r1, 0x801c581f, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 09:35:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) sendmmsg$unix(r1, &(0x7f0000000500)=[{0x0, 0x0, 0x0, 0xfffffeda, &(0x7f0000000480)=[@rights={{0x0, 0x1, 0x1, [r2, 0xffffffffffffffff, r0, r3]}}, @rights={{0x300, 0x1, 0x1, [r1]}}], 0x38}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x80, 0x20, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000040)={0xdc, 0x49, "ae115bfabfb126ea2137af86029ede2f0f80a93f8ebb49699b9a0555528869fd59119040c9e476d153231e044b27e105ec22fa7ab2a385c6a9c645fdae7665d2bce8151658e6c2e89c"}) accept4(r0, 0x0, 0x0, 0x0) 09:35:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x2801) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x111000, 0xb) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000000)=[{{&(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x363a, [{0x0, 0x2}, {0x0, 0x2}]}]}}}], 0x7}}], 0x2a87c86309ac2fe, 0x0) 09:35:17 executing program 3: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f00000001c0)='net/icmp6\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write(r4, &(0x7f00000002c0)="8848c07b90393d50371cbecd4dde36657e4dd534fe29fa740eb61136b157caadb38305d2f240a01a5b48f161187cffc17107e7ced07855548e5e870f775a7d875afd0a1b0a03fc7779a293ac15dfbf363754fd48b02fb53408432d8f3017255df96c4abe02f75fa33812846df4720273d904d877560e66a432fe80030e69b5e34a256208fe7daff7f52eb8ef7ea6c519935a875867d304e6ce0c45050a61e254182fd59c320f05f91e5a402f6bf52e568721e3bc01117d7ed0936590dad755fe973dc8509da674f9bdf03ad765aaacd4c0020a69a420e77a6b82ad10bc4623cb6d115a39e6dfa3616d89c78b11986ca73735b938", 0xf4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000126bd7000000000000c0000004c00020008000e004e23000008000600070000000814ab000a000000080002004e22000008000500ffffffff08000400010000000800030004000000080009000001000008000800060000000c00030008000500000000ad"], 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x806009}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xe4, r5, 0x58bdd1944ee85ec2, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x21}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5b0}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) 09:35:17 executing program 1: r0 = eventfd(0xe5b) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@ipv6_newroute={0x1c, 0x18, 0xb03, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x1c}}, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) 09:35:17 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) write$FUSE_OPEN(r1, &(0x7f0000000140)={0x20, 0x7ffffffffffffffa, 0x5, {0x0, 0x2}}, 0x20) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000340)=0x14) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) recvmmsg(r2, &(0x7f0000000700)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/28, 0x1c}, {&(0x7f0000000140)=""/55, 0x37}, {&(0x7f00000003c0)=""/164, 0xa4}, {&(0x7f0000000540)=""/197, 0xc5}, {&(0x7f0000000340)=""/13, 0xd}], 0x5, &(0x7f00000006c0)=""/20, 0x14}}], 0x1, 0x2000, &(0x7f0000000740)={0x77359400}) eventfd(0x5) r3 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000404000000000"], 0x7bf74ec624973291}}, 0x20000011) socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="02120300020000000a000097c3d344734e3403e52d584581675821c250d1744de9ccb0356a0dda50c4b5b97076fe1fc60b2b689ad6589f0eac9806886259cacc2e494229d3b39bdb0a15dd32819fdbbea6d7881177540a3c0b23a322b9506673be785195034910537b54bd7d72fa301a277ca071c4a6add5dab83edf3ebb7cf3e8e926d990403ea5d3a45710db9a9dddf7580e56d0"], 0x10}}, 0x0) recvmmsg(r3, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) write$selinux_validatetrans(r4, &(0x7f0000000780)={'system_u:object_r:restorecond_var_run_t:s0', 0x20, 'system_u:object_r:hald_dccm_exec_t:s0', 0x20, 0x7ff, 0x20, '/usr/sbin/cupsd\x00'}, 0x76) [ 138.416824] IPv6: NLM_F_REPLACE set, but no existing node found! [ 138.428423] IPv6: NLM_F_REPLACE set, but no existing node found! 09:35:18 executing program 4: mkdir(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='oom_score_adj\x00') getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000180)) creat(0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) listen(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000087000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000080)={'nr0\x00', {0x2, 0x4e21, @remote}}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000002c0)) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) 09:35:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x80, 0x4) io_setup(0x53, &(0x7f00000003c0)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x14, 0x0, &(0x7f0000000040)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selin+\x03/L\xb2eckreqprot\x00', 0x40, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write(r2, &(0x7f00000002c0)="8848c07b90393d50371cbecd4dde36657e4dd534fe29fa740eb61136b157caadb38305d2f240a01a5b48f161187cffc17107e7ced07855548e5e870f775a7d875afd0a1b0a03fc7779a293ac15dfbf363754fd48b02fb53408432d8f3017255df96c4abe02f75fa33812846df4720273d904d877560e66a432fe80030e69b5e34a256208fe7daff7f52eb8ef7ea6c519935a875867d304e6ce0c45050a61e254182fd59c320f05f91e5a402f6bf52e568721e3bc01117d7ed0936590dad755fe973dc8509da674f9bdf03ad765aaacd4c0020a69a420e77a6b82ad10bc4623cb6d115a39e6dfa3616d89c78b11986ca73735b938", 0xf4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x6c, r3, 0x100, 0x70bd26, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xad}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3fffc000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 09:35:18 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket$inet(0x10, 0x3, 0xfffffffffffffffe) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) openat$cgroup_ro(r1, &(0x7f0000000dc0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000680)={0xf, 0x1f, 0x80000000000}, 0xf) socketpair(0x1c, 0x800, 0x6, &(0x7f0000000e00)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'gretap0\x00', r4}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/20, 0xffffffffffffff0c, 0x12140, &(0x7f0000000400)={0xa, 0x4e21, 0x2, @mcast1, 0xc92}, 0x1c) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x3, 0xfffffffffffffffe}) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, @perf_config_ext={0x2, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents(r5, &(0x7f0000000280)=""/135, 0x74f) r6 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000500)="fbaeeb4a928db3771f7af48038b58105", 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) syncfs(r7) r8 = creat(&(0x7f0000000040)='./file1\x00', 0x19c) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40286608, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000000100)={0x1, 0x6, 0x9, 0x40, 0x2}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000004c0)=0xc) perf_event_open(0x0, r9, 0xd, r0, 0x3) sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000200)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10003fffc}, 0xc, &(0x7f00000001c0)={&(0x7f0000002740)=ANY=[]}, 0x1, 0x0, 0x0, 0x1}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000b00), 0x0) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000340)={0x4, 0x400, 0x3f, 0xfffffffffffffffd, 0xf4}) 09:35:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x0, 0x8, 0xae55}, 'syz1\x00', 0x3e}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 138.655346] input: syz1 as /devices/virtual/input/input9 [ 138.697376] EXT4-fs warning (device sda1): ext4_group_add:1612: No reserved GDT blocks, can't resize [ 138.708582] input: syz1 as /devices/virtual/input/input10 [ 138.737685] EXT4-fs warning (device sda1): ext4_group_add:1612: No reserved GDT blocks, can't resize 09:35:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x31c6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="5004aee564df371de87d5829f0b9f00579c91fde84631bdd431b57cf963ea1e4c6439b5cbfce5057bfafbc5ea5fe4590689854fa72f0559b521cd15c6cf6c87b7895d1e845953f07cd2b98f1fffe78a08d29411a865ea1177e2b91c64fb4b7b04c3a3b48ac", 0x65, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r2, r3, r4) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r2, 0x82, 0xe5}, &(0x7f0000000040)=ANY=[@ANYBLOB="656e633d706b6373312068616505c7bf73683d6d643400"/79], &(0x7f0000000140)="3364b6c52f045f85cc26442191b27e08760228948e1c24b6bfa468c67ca10327fea2845342018d6eab25503d472adf183146f28d1a0a3d5bdae638457a76274a25a0f3b0ab8e4b2f491a7a5a69946cc30d278f3e2527f574ef543f1589568894033a32e65393dc9538979e62941d4c72c20c0bf0e0895d2ff7d80376ac5d4da1be4e", &(0x7f0000000200)=""/229) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x80800) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f00000000c0)={0x1, 0xc52}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0xc, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05630440000000000e630c40"], 0x0, 0x0, 0x0}) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x7fffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001600)={0x8, 0x0, &(0x7f0000001480)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 09:35:18 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000100)=0x72, 0x4) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000900}, 0x92608697360e8ca) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$FUSE_ENTRY(r1, &(0x7f0000000480)={0x90}, 0x90) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000000)=0x8) writev(r3, &(0x7f0000000080), 0x0) vmsplice(r1, &(0x7f0000000a00)=[{&(0x7f0000000040)="cef447c3105e89656b1ac2bb20218506b0cfdb57c7ff4f46302fe2983ec8956236bbd3e47327a94621c9beb39d8d88b4222d618e279ceaf424", 0x39}], 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0xe211, 0x0) 09:35:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xa8, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xebe}]}]}, 0xa8}}, 0x4000) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) mkdir(0x0, 0x0) poll(0x0, 0x0, 0xffffffff) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) write$binfmt_script(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xfdef) 09:35:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x400000000000033d, &(0x7f0000000100)=[0x0]) socket$inet(0x2, 0x2, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r2, r3, r4) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r2, 0x82, 0xe5}, &(0x7f0000000040)=ANY=[@ANYBLOB="656e633d706b6373312068616505c7bf73683d6d643400"/79], &(0x7f0000000140)="3364b6c52f045f85cc26442191b27e08760228948e1c24b6bfa468c67ca10327fea2845342018d6eab25503d472adf183146f28d1a0a3d5bdae638457a76274a25a0f3b0ab8e4b2f491a7a5a69946cc30d278f3e2527f574ef543f1589568894033a32e65393dc9538979e62941d4c72c20c0bf0e0895d2ff7d80376ac5d4da1be4e", &(0x7f0000000200)=""/229) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$inet6(0xa, 0x1, 0x0) listen(r4, 0x0) fcntl$getflags(r0, 0x1) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 09:35:18 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xf}, 0x20000357) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r9, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r9, &(0x7f0000000080)={0xf}, 0x20000357) r10 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r10, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r10, &(0x7f0000000080)={0xf}, 0x20000357) r11 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r11, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000000)={{0x3, 0x0, 0x81, 0x2, 0x1}, 0x6, 0x8}) sendmmsg(r3, &(0x7f0000000180), 0x3ef, 0x0) fallocate(r3, 0x20, 0x2, 0x8bb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2a0000d4467bda84b88ba61a0004000000080000000000000006000800000000a1ac65c4fb0e068b024452b5b11e62cbf9af1e5d919a2fe05d7adcb2a6d166c4352501dfc88e5b0a8d3eda87bac403"], 0x20) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x3ef, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)=0x5d20f1f579ef64e6) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@ptr={0x4, 0x0, 0x0, 0x2, 0x1}, @ptr={0xf}, @ptr={0xf, 0x0, 0x0, 0x2, 0x3}, @var={0xf, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x5f, 0xa6912763c469eb5d, 0x0, 0x30]}}, &(0x7f0000000280)=""/247, 0x53, 0xf7}, 0x20) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x4f, 0x61]}}, &(0x7f0000000400)=""/88, 0x28, 0x58}, 0x20) poll(&(0x7f00000004c0)=[{r0, 0x1000}, {r1, 0x10}, {r2, 0x201}, {r3, 0x4008}, {r4, 0x8}, {r5, 0x2200}, {r6, 0xc780}], 0x7, 0x4554) r7 = inotify_init1(0x80000) inotify_add_watch(r7, &(0x7f0000000000)='./file0\x00', 0x4000000) r8 = inotify_init() fcntl$setstatus(r8, 0x4, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) 09:35:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dP[M\xfe\xe1\xb3n=t\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x4004556b, 0x100000e) 09:35:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14, 0x80800) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001500)={0x0, @loopback, @multicast2}, &(0x7f0000001540)=0xc) sendmsg$nl_route(r2, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=@newneigh={0x68, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, r3, 0x8c, 0x2, 0x2}, [@NDA_PORT={0x8, 0x6, 0x4e21}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0xffff, 0x8001, 0x800}}, @NDA_IFINDEX={0x8, 0x8, r4}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_PORT={0x8, 0x6, 0x4e20}, @NDA_PORT={0x8, 0x6, 0x4e22}, @NDA_MASTER={0x8, 0x9, 0x9}, @NDA_VNI={0x8, 0x7, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x20040000) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r4}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r6, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r7, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000010000aac9665cbcb83859e9a3ac000100006f09908b2131b67e2e29ddd52245f8711e07a435d0b5af4d7c0fa3ffbac46028fe53", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x23, &(0x7f0000000000)=0x7, 0x4) 09:35:19 executing program 3: syz_open_dev$binder(0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xfdef) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000040)={0x8}, 0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = dup2(r1, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) chmod(&(0x7f00000003c0)='./file0\x00', 0x4) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) 09:35:21 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0xcd7191cd06a7de55) clone(0x83012900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000300)='./file0\x00', &(0x7f00000000c0)='vfat\x00\x1d\x81\xb7\xaaf\x83M\xc6\xd69\xdb\xc9G\v\'\x86\xa9\x8e\x186\xe2\xe8\x8b\xf1\xf8J*\xef\xb6\t\x18\\=\x80a\xc9\x111O\xc1_\x86\x1f\xf3Prf\xeeo\x15i\xd7v\xfe\xf6g!\x8d\x9f\xe3\xd4*\xf2\x06\x99\"\xa1\xff\x05\xcb\xe12\x17>\xcaE\xaa\x99\xa9\xc4.\xdf\x9eA\x99\f\xb5\xff\f\xf8\xccg@:\xfd\xf0\xde\xa0\x89*\x9b\xbe\x02\xfaE\t\xcb\xe9\xb9\a\xee\xb7@>r\xf4h\x94\xa5\x8b\x86]\xe7DT\x96\x06\x98\x8a3\xae%\x96\x12\x8f}\x03\xcf\xad\xca\xddi\x82\xca\a92TU\xbbk=P\x8a\xb0\'\t\x1b\rw\xd7\x0f\x18@\xde:\xd7[\xd6\xb6a\x12\xf3(\xa1q\xc0\x17y\xf6\xa3\t', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 09:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000800)) getegid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getgroups(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) stat(0x0, &(0x7f0000000dc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) getresuid(&(0x7f0000001340), &(0x7f0000000140), &(0x7f00000013c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001680), 0x0) stat(&(0x7f0000001700)='./bus\x00', &(0x7f0000001740)) getpgid(0x0) fstat(r0, &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./bus\x00', &(0x7f0000001880)) getgid() r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = socket$inet6(0xa, 0x801, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@empty, @in=@local}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xffffffffffffff22) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002780)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000002880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000029c0)={0x0, r0, 0x0, 0x8, &(0x7f0000002980)='vmnet0\xeb\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getresuid(&(0x7f0000004e00), &(0x7f00000002c0), &(0x7f0000000280)) epoll_create1(0x80000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 09:35:21 executing program 5: syz_open_pts(0xffffffffffffffff, 0x8601) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000740)={0x1, 0x70, 0x1, 0x1, 0x4, 0xfffffffffffffffa, 0x0, 0x1, 0x50080, 0x9, 0xa875, 0x7ff, 0x9, 0x2, 0x7, 0x2a, 0x101, 0x4, 0x7, 0x4, 0x8, 0x3, 0x2, 0x9, 0x7, 0x8, 0x2, 0x8698, 0x5, 0x8, 0x9, 0x8, 0x1, 0x101, 0x100000001, 0x3, 0x6, 0x48, 0x0, 0x8, 0x1, @perf_config_ext={0xfff, 0x1}, 0x2000, 0x0, 0x2, 0x7, 0x180000, 0x10001, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x53f43f85d1d7765f) r1 = dup(r0) utimes(&(0x7f00000007c0)='./file0/file0/file1\x00', &(0x7f0000000680)={{0x77359400}, {0x77359400}}) socket(0x10, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r3, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) lseek(r2, 0x0, 0x1) readahead(0xffffffffffffffff, 0x4, 0x2) sendfile(r3, r3, &(0x7f0000000440), 0x20) sendfile(r3, r3, &(0x7f0000000100), 0x7f8) mount(0x0, 0x0, 0x0, 0x2000080000003f7c, 0x0) pivot_root(0x0, &(0x7f00000002c0)='./file0/file0/file0\x00') r4 = dup3(r2, r2, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r6 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f00000003c0)='./file0/file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r10, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14, 0x80800) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001500)={0x0, @loopback, @multicast2}, &(0x7f0000001540)=0xc) sendmsg$nl_route(r3, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=@newneigh={0x68, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, r5, 0x8c, 0x2, 0x2}, [@NDA_PORT={0x8, 0x6, 0x4e21}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0xffff, 0x8001, 0x800}}, @NDA_IFINDEX={0x8, 0x8, r6}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_PORT={0x8, 0x6, 0x4e20}, @NDA_PORT={0x8, 0x6, 0x4e22}, @NDA_MASTER={0x8, 0x9, 0x9}, @NDA_VNI={0x8, 0x7, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x20040000) sendmmsg(r1, &(0x7f0000003f00)=[{{&(0x7f0000000100)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)="6b9c1a986302d2191afe03f6eef00a5476867eca4401840096f1e0df70911fc26a31fe32fb62ae184ffcde4124edeb39d6ce3c424d35b0d30770bbdd37eef86af570d1a7b03d3796e08474e0ededa2f0678c8c4f312bd008c540870fd0a88e7c887bfbe51d8c83baa4122c62f5cecdc766e1161ad3657d28bab8148f03ae7aad03", 0xfffffd64}, {&(0x7f00000002c0)="c2eefbdbd71720989cf348ce0341a862dcad881563b55b8777a5c3d74ccd2deddfadf42ee4183340ee8f1d63458783186662c465", 0x34}, {&(0x7f0000000300)="378c3d676008c69c6e9e5df2e4360fee5745183dbb406a97c61347e02475b0b5c642dd5833bb3954fa01e28c4a3820ed9e0aa0312724173990dd1d3a39085b5d0a6db07d7fbdfdd73daa2fe86069caadb26d193f5c834342a86d3bad99b820bdd3068817d2da8d24495a0075517c754a68d40bc54e379be52430e1411a84226f53083bd1dc5a08848dd6a515cdea591818147415ac2f59d5066d22afbd08ae04b7d3d6a7c529f4ade84ef9d10d0802b7431573fff8e3f68945aa9d8104b54fa68cad8f", 0xffffffffffffffb6}, {&(0x7f0000000400)="c428e8d446e8d433515695fe6665dca92eafe805e4e5"}], 0x4, &(0x7f0000000480)=[{0x40, 0x105, 0xfffffffffffffffe, "6f1d96e7aee6c98f2156b83108ec5e1ecab32b4a5b435029343164c8e966378b460e470411537c1f5c1e93"}, {0x18, 0x11, 0x6, "a85109c3813eaa"}], 0x58}}, {{&(0x7f0000000500)=@ll={0x11, 0x0, r5, 0x1, 0x2f9, 0x6, @dev={[], 0x24}}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000002580)="abb8fa9e135cdd4c919bd1660c3d2447319cf3680ca9be318c127e70d8cd8e4e641be053ccb0b9", 0x27}, {&(0x7f00000025c0)="5be5e99acb596b3373ff985abcf40ec880f84380e46140650f3775b815d1c9f1dea22b38307a45ed599e39b1fee581188c28f3608a28a80b466cb0e452325a2c9c68b99ed95b8739a7363cc2936d0e54d81d16158f8745620b01b59d30cb0b653057fe6750f52714805705293cc87f5a6334e6844113e85d268bff0d1adab17f15cd5e0e5bcf1e787308af8c90facb304fa90aa18d7a5d43181a872e347751a5e0", 0xa1}, {&(0x7f0000002680)="2a21efb113834d316e52a814386751b3b4f5f6bc6dadce68711de3f68673a0b940367a50969ac558f618e3240c31e6cf6c71783d976f65d410a0c02ab2d70a52dbbf86a4d1a0f267cffe974e964fade7032730f56a300724c734ec94e442e1b3f2977b1c7c4f10737145f02778669367d0eadff6d387717c10d0674a2b111d481219c66ab8e2ff3b2d594a76ffd1d4c8e76cb76a2881c9eadd62d811459fc11d3523703b0c4e4d391cc0eb0a22667664caf65ef7", 0xb4}, {&(0x7f0000002740)="c39bc86d788f6341d47aa505665e550faac53bce4b47da83466d130436f28fc48ce428df3b4bcdee2539c5438b22f0119782f453548ca1656fd464b968179114d7a944add5a79f08fe41975422d59dc2b1c6e4cf8c9ad7b627c98bf2164a20b49b38e9eba442a6de0f077f5f0b167e236e699d2852e784ad0cb9822c84deb21d013c57bde4", 0x85}, {&(0x7f0000002800)="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", 0x1000}], 0x7, &(0x7f0000003880)=[{0x68, 0x113, 0x5, "444ddc3bf64e52dbcbbc055c82e425c259b578d60528e6353534466c9397e68d595866d0d622c66cfb436685c08354ddbad15e2effbb687b436dab0d16c8ad0a68a52f6b913b501b18b2312bc90af88870"}], 0xffffffffffffff82}}, {{&(0x7f0000003900)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @loopback}, 0x2, 0x4, 0x3}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003980)="f90fd68c847f223ff3a1577fb7e7d7318e67cb221c5da546988f7a47c4a319ac1a3d9a849b8710da25f5dfe78fb2d305029578a0bd012855e67b877f1a31498774f8c2d03a084b125f2d24ce67fdaf1c", 0x50}, {&(0x7f0000003a00)="b70f6dfbfb8b032f4a55da41e3c24c7d1a1747df03c84ff073e9a09f6ec7c2aa2bb2e488be08e576ddf91488937ee7f8c368ba0012210ed56031cfbe7ca4c5aa4c69d48169858db25f09dd37ea1bce0bfd14f18900754b53b01718bdd09391858441194f2beb0a843c388f5ec392b9f6b345e51f36b43b201d01c1d691c6c902ec25a5172a32971a8d97b2b64680e0c450d08906972ea441441d145adcb1e4fd40d0eae9815e38abc3", 0xa9}, {&(0x7f0000003ac0)="d39e62acc5979e3e303974c8d6189f8f54ab7f194912f09e821203bd4f42bbc8e2358d517010", 0x26}, {&(0x7f0000003b00)="c3b5b4ea28907e459c71600f1301c1dc20d64a2ff36bbbe939f349a97f8a0f85c0e237e0c471c4e245b6290b925f6aea1eea2269e73d84d46fa10cec3f35cb5f115573654ff67ecdd735d3761c080b64f56e32ccb26b1ef7c314552ef40014b602ca358178071865535637ce014469878d5061282552f234c266018b60647e4775437f2f8487158b35cf0fe569", 0x8d}, {&(0x7f0000003bc0), 0x167}], 0x5, &(0x7f0000008540)=[{0x60, 0x84, 0x3f, "4ff21cad7df2064a4a11ea98058a32fc72ab8a73f9cd7ddcee49ae27ae7f5a8f0137c001c3cde6fdb31378aadd29e26c6704c607b11958c0627168511e8bbc48b05df4133ebd07d2e0b52a59d0"}, {0x1010, 0x84, 0x8a72, "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"}, {0x121, 0x11, 0xdc, "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"}, {0x108, 0x88, 0x49, "6f9d6ec7c737e48f2f330522bdbb7b65f67e94d4712ba47d690f506d2f2cb52f7ca55747b7cb2514ae39d12e29a142961cf5d14017f02f64b866a061026081a069b418e083e115a6678d8dbe2978dd30ea14ac95617071d96e3ac8e1e586f72aa0aac7d4d415c0bdcfe6b162d956103024aa87b051d6bd9f2e9a2da4d9d18c7ae7b6d65c24eef8a038052295ab150568ea3f9e15de41b705c96f0f67d149e90d02e47a186b8804eaba9c46dd7d4dd1fd54984391c0c5416fb1ec7d3a618fb4136965092f07aac5fd06d9268b8284f3b7892ee60ddea440907189598df4c629a9238c6d75994745b160e5ab2fdec4d8757043cfc29a6267"}, {0x78, 0x91, 0x3, "233fe5ca6595823b24d330578e88b86fcb981b19bb1c54d6f5df7e5efcdfaa3c9e78274c5ff74ffd4e6b5a8e7f9b3e436958bae3613fee0e8f57bcb302aa535497593288405ee786bfe57c2e9c888cdd6e9bc2880561f356db88bb83f334a0a6619333"}, {0x30, 0x10e, 0x4, "617fb8a05b1cc2d3daf9bb8f801f4fc971e1df3170c8ed5b17a6a0eefa32a3"}, {0x1010, 0x10e, 0x4, "14f9da1b898ffbd1c40986dad09c7b1c9dbf3dea2a83338fc7b615f07018c0b7ea528494f8d04f0a752114a0673db4be08817c9e330dde8309b6ade3d39745cad254045fe168e6ba6220e415da6d5998a58bedbaa076c66fa092ff3531ddc1328dbf79cf48f7413d8290c29f2c1db3da82d82c1c18c80c4df60f99cef0b029987c2cabd7745aebae0daf4a93c1bdf625c5c689369bf07495b93e5e79d291e19f569fdc7ef5c9886f953b39dea1c6fd439d7dee344518a9aa3ff824c83f8e8938ce84f586acb3132cb8c0e291587e046a5871ebb0f9e628719db0f6cfc25fd07d9ea829d62883f53310b88ace85be0469f7ef8cd098107f2e2a477f927c296ffb815bb8ce7e14b8ea301afbca13340cc3e928a6707dfa01d43ffed167bf5794a6bd478611be3f44f05fae6878c9c628f0dc94d934e5ce8eee39104fb97938ca2ea6bf58d8c322067ebb0fd9438ee89caeb512f31a3d2220ec83d2304be62357669b89050626287ab02a3cd8ddb27eafbe8626030a900d38b0ee6e0efc00bbd2c744e8e25b24c28e0a54d035255174a4e021aa12b8b5189a7b1f9709d88887e79f485133ffcfe33525f59ee98e58966a5710996e9e1857310883d0429aec8e9eea993ab70ce8fc64480e63370a92a4240c73f25825de3a3ccc9c8359feaa149a59404e51690ff6c5d2ae3c281d1b22571f7bed138364a81e3477791144b1e6fdf378864649839abbd382c2a1b11bbd875682404034fd1a9d45c89eb5be521996001ac4b161f3712fa27aa19205820d7997774bb93ee1dea1c3a9ff09853a9ca122ac6c15f984af406fcd6a8a17a6d54f71cf94ba8b7b08eb92ecc6f9957222e7b1a8902e7da938f3e4f50aad01e76140f426d9732f8a59b84267402d48f572369a100abafbdbdf18aed1030f753ab57ada48c1871669024597c001b309bc973f7735250af3219cd3fd9c03ace445e1208c2a360bd4759652d5b7f4d31a6c19c8f7168969b7965a95b39945706eb79f6921c3c556cfd5f54a5b58a73228babb3ca0381ec9cc80c9e8497ce6171abca1395f20c984ec5a838b7e100cb5faaffdc1adbf586c094dec17b46fb058b30aaf2a9a7066ba8c622d45facca78be040a5f555da78c7ede810475505aa2f0d3c5683ee720575aa481be2cc5271705465528b173fa121e2c1d612b17c33cd8e433f069811383cad0904dd6ab74cfd074016d1d1cc8862389f34f31bace8910cc97fe5d0da4e00ab77ab0d33e3c7716c587c08fd3bacea326fce4a17f0d0b8f70e1d63122ee93fa0c969cd51bf21bc89ae04e4209aa19a4b386f8101a79a4542f15845f589283f4716418856d0cd4f93079c48bc15303d31fcf0477c1290d186991bd74e1e1a93f9c5cf0a8422a742702a8966ae0aa6217b9264ff9f2b8ecc839d5e9c5e4b4ad77fe51b4508e185bf9fa2a34182b153c854d090a9801df99b0d911954d1472ef785617ef59a84b14a4442a999c3d42873a388c775535e03b11d8464b16848339da52824dce3d95fa8d921d6b0c43dc36f84a10ded90097b8f8b77bc7207055325868ae00b892a8e787e7541337e1f5882bf48c4d75f2d58fe18c4c86c53120cbd5f533c79bbb961a6e3255f7f00958bb0f41ca74d88d475cdf37ad1138048f5ebcb101192f317fa55f394b03f0f7e44e3c44f0ad99abc4a39635efe75b3b4542c165323016ec8a02fb764d909ee85b7a6e9800a257e607dcf37f548916e958960c78bb532afbd40d8c6f9cfb5e859d8156fd8dd7edc87311d7c26a464af6f92bc8a7dd7fcc0a0de97881bdcd5d183553ef81bb819e20c8d690481c2306cb8bd273eea22666175f11407275a116a5bb0e58ddff6328ee0f42002e3abcb5d882bf74898d322cefb902c6cd9c104e98611001e6f106e59caf079657b5b36d08ec1b0ca082c8cfe9dbe763f88386a315f715c7273a2947a3a8342822d9fdba3e4dae4e4ed8ebfa306b8383ebdb91e47cbd9faa5709a917e65e86fe33aa94ef1050b36f80fff749ff944c9324605e953216ad7ada223c20f27e48899329a485148baf1ecc82c7590e7b9517a792fcf423b178ccb4a463fae5659acf83749a9e43c86631d948d3e0846d2ea28b3fd45cd1b7fbbcf96d5cd227f7538e7e45ce2e4d29979dfd8a62f3efd43bacb810ac4fe510adef4f9ffd9a35ae62089e161d15ffac39d5539a40fe9af5c2071a1ca7e459cf5ef242e319f79f14678ad23ffa92f84efa9aa5dea7a543622654a8c4a5ad603aaa68aad98724d5cc714c9cb751f50345e91e639b41950de898f1c08bcdde7245615805ab1acaaf839cc0759dc0ab15f56f7bdf1683d182b85c7842cc763b0cc577d6dab63e11da7b8d6bda26e21667a697f22ca4d7e6add0ec291b9ea6d8bb5758fd706fd907d1a89d040eeb80defa646f1628dadaced9e9f63fdda651967a9ca7a3ab19f8ca2e9e5d21542e683e14ff877df08c302f810fd3cd258b64a3f6fed7a80c5e215127e13c664f9c77d8ec2074bcce029c9e41cd569cc97246c6028b55dc9e9b241ec8836a719c9f7bd79527d203218fb6ea143899d8462eb4f5717a0ad1d5f5f2370677f9315b9323813cffcbd7ada60e05cb9ca0d717dd9e703089a5e8288dcc60185549f8beff1fac968bf342461a958132bf4502fa6a147a2a57356ac9e539626dd488e11de382895a44c9500a3c012219b0c40f3626a47656145e4d6b323f71d0d4b87ab30f725ecdcc4a01640cd31dcaed324af7ea758a8787a88ee3338a6485b57733eecf0bafb4d663f980392fc2d3c90c9587958ea6c6002b964042228e770e121919db609fd418daf67c87043935b212390ce612d4fbb499de87a9a4267e17fe0777ba6a84f4aa5e5897f39810f5747450c6ae31a9ef89ab4eef0a339f0c9a56e9c67e075b41b1aa225f55f4228a5d9b021499939f991df496a7857aac4faef82d4ce0ccf8cdd7bbe42ab9e68694252a74713feff54938bcc5450a7835fd2f1b2f2ce5fbdb99c82793728b81ac445401f2095b3ef4bd347b42e243a4cb3f94c7d32917700426643c89051ae3d4682feb92fdb5d7ec58b9471c3314239036813ba64f20b9acb540bef42c02d782d40729614f68ace2896834e4dafb31a8ea4c39df0249df78c060960c2a34d8985d1ea737cfac9d8df5263e79a49af3df46608982235840a4ac357bfabcd423b536c38654e590066d555bffa5acaaa8eea4b31dec6fef0c8a8b93a6b6835f8052076a4119a61e8325ec5da7ceb8710b69c99278834c578d2c0e5e9fc429c9d90d88f2ca3480280481e7f965554c481012c0e78eef307cd7a88f108bf522e7b50bac137c2da8b184c3f7957fb8324c1b0e67d09b7a00e908dc15cde58ad7d198ca0343cbe4a163ac0e66ff94b63e969a5a2fbec5ae917532d42c9f479cd2a92dc8f3d97d0e01ee0cf18e3136028ef741fa4c61614736114714dc2490e4b23129ff3ce7685373dda0ea366b28d781e872ffe81e0fd8505f05436e8cba8b0f607c74683f5f243916c409d005cb6ff153a7366cd60fb52b4235f7d2be7638a5b5bd1d800a7fcfa8d7ce96b8fa82e73cfc460489ff3e396467eec439af5d63b27fc873dbe70e05d6d5798402342299ea1dc406078eae2fd8a1ce47fc50572807e833df22c6280028db0e433c29f4e0164c48401b9b1be40fe0c7e8aac2efe1dc508155c4d3208bd54351d36d18ff039ec71e23239a1ae3d81346896e45fe17bbda5d0082ec3152184292f855b10cc4851b6095545a3d8252a8cefdc00121f40c22c924a7bac0ea483514cbe21135ff225d457d67fbf6c9fedee6dac93a2550cc658de62f66d5e2772616804d88f9d5ff2a77272e480685396fb94ab25dfe9b631384c743fa1019339f53c287e9cfacceb43bbc192002884bb91afa6e0c8ed07ae5281f665878fd6b033e8eb119caa95cd945f3aecbb0cef0627483e777feaefa147f2a0ba3608d92114a782c7e84385ee428b2b005b6005fa65e49f4a8404cdeb2a61124bec66dcc762fb36e2ac9fbc2fbc77a4fbc484b58698faa88b824a1b43a018f0391eff174065e2d349a789c9c753f3608e2cf807ad1cded7703df72631f19159d64a3b1026b4932d71614b688b73416a30b7f8db9a56ea156f585368e5e28f9882e9ebdaa673aa6f725566e4c2c458a0c36aa01571fed93ec6e1658d6d768e180d419af8b7392de6048f2579cd773e5b6bad0e6db7ff23c4e3313d1a787e47a7aea3ca7e8e57e203a47043d31fd6da4761998b19e76637061cf76a245fc7d3f85963e146648aaa92ba40f1dd7ccdf7470d79faf1ea2180aa3420e7cea76d882eb071f249c915caaef104f80876d0457381b8bb0dc9754b8f4d6f983a8db6880e21f39ef1723b02e4fc01841a075f902f72463e1bff26df271e4637fa180194784cf7bf123270038950b9f519dfa3e8b7e41cb545962da97cc920e2b1c54e91b1d16e89665e465d01199adb980272510a43b848c62c0a345832e4e1caecc9666eccb0ba868c7f8aacb4bd59b72d69e348494029e9e624fd579e70732becd721a5d2cb27f54a8f34abcdb71a51ff50a8c8babc7f1c2d20d01246e50be21f9e7f6d1f81cf9296e7847fd5b0798ed182d48d4a86c8f50a7e33e315c4b106ffb12155f46f3e0e6a342559197be98ff9b69e52b8c502ce35d1363e34104db8355a2fedb46ba16c5253265939d27fda7519df6dae18c489455dc0f08edbbb2940c2458515824bf402069dc92c483c837d48771b0f49775a8321e2e2ade909326c8856f6b6021def4ee812f0c3c8db048f783b813358e6c5397baf7b093aa89661d244a3edecf5d6593daf70640ca5d1f3507a910d317484cb43e5a8861d67c7c264859cf6aa940f2928411604d2a01186646e61335166401e8627152ffed89d58455a1d6749576a4fc8f847fe27393b7fdf38afd2cbd2d5122966a5e8c5dd4c4390a97e13f6cca6d0c04e4174914e97566108b024175c69e980fcf4d728195e70601a567735616e68b5eea6387ba873ca5752e4bf9485af0c4472ec3a7e09560588cfab9452beba0762b83bcd5a8a1a2f73b69b9bc2d8596b7618098a76edf759bdc08e10799753e027606560d2aeda001a0aa61ea09b335b3a0cbac0966c9b4a5041d07ef090dbe42eb39c239ec6850064d06370b0f30810cf924610aa97827217a6ebf226a2b0da042aa08001421f67a746c55ba9f9bf4ba4ccfddffc4633877c5e9c84ac23e6bfce27e2a90a376f265394f8e335c59436084f5f5c3bccb9131bdcba59f26399b1211078cf2518b84140fc3e3a1c8eee97f844c167e1d8ff891090091e5b31311b6f2a7f3fc45de0be959aed365cbdf9b104188126555b3a60bdd0d560de9de9e8732db1b131e046c854a96496a01f4793650d8c17aca7944becfd25afe789d03e40ef40a355d008a7ad518a68146febdad875fe20d83daab8afe0d51c6b556f40f0f5eeba0404be792d4b0a15d96ea1d1140a762911d8ae8c2170fe165cae056780932536aa266652e8a3f99680bfc5ad1b6ce7ad7056fbdf305284cf111d465c3728cc1890850d9b52845404b7afe80d9af4b87c3b2a83e1ac2c5b47a79dfcc6e96ef9451b80c47bff976de5fb06a707a1b1d5cbb23da4f87c494afa0124137c48f9132837405b314e9c101240b79d14619d19b277bc798b85e3ea2a30f2e82b4768a8ce0db2cb4f04a19e3b92dffd740118b19ca78c204544319197cb6be622f21b1d53c767e29ece1f0326c71fbb6f10895daf8ace388b227210aeee0b6f0f8bad0b"}, {0xb8, 0x0, 0xbda6, "e6d80681a11399502c658134ba3fac2919e9906f6f940bc05f05ed79d53ff03de4cc16d363751f9483c2407648d757bfbb43f2d185a306df0630939c0cbb49da6dcea43f012cee2194374c553bc72866563942378b866f96cbed47a76b89bc7540b3420687deca5ce095ce9b0b900f6e00548b2a152a9dec534bfce3daf936d2a42e90b2b7ca14bdd0155e76d7ead5bb3ed47392383d08c8e0bafbee0a35e20f8f0abebf"}, {0x50, 0x104, 0x200, "011d1af5972320d14b3f9324f03e8df84548a515403a48aea0264a5f789fcc9be3c2bbd416b374d93c15c65c60a1ef725278591f807afd7b8978f58a60d1"}, {0x98, 0x1, 0x3, "61ac2c3cdca367544d14ed8b507137048dba2b22b3d80c2424269d646260a8343e62c13e2e6b44c5aa403feca9d051db95c0e38a62bdb31dee96fef71a2ccac8f91a6360bddb3d644cd2f09965d18f0404b5181d6c4bfc391b11237448a8da40acfc4cbb40169f9e6577127fe14335506be7599d17ac79b263fbb847c4010b1666f56e3c3ddda51a"}], 0x24d8}}, {{&(0x7f0000003c80)=@ipx={0x4, 0x1, 0x7fff, "f8dad9b71809", 0x53b2}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003d00)="ca8d186d5b4dafcc1835666c0bdba89a43cd5504f72c3e46e69dfd2d96f77d58457879d04d2c93e63120b628fbf18b6325d9bc3adf1c8622510680407d70af75f8790f30be", 0x45}, {&(0x7f0000003d80)="ea6fdceae8857bb0997bb1c99a8c9cb8ad2774327a993b", 0x17}], 0x2, &(0x7f0000003e00)=[{0x100, 0x1, 0x40000005, "cffd1b229f57a075d8a2c94c0b2027da24d5c1cd2984a7a4dac5d52d2d24515e60e2fd07a6ce489f70debc870346d1ce3c7b9e21cd30a64e3cd9a7086ecfcd66ea70ff24d7c0d9552bd4f438d4b966f0e2122192c487e1f906a52d3106fbed3fb988f5e68213ec04955659602edc07e95e7e7acf1bbde4968fd9a76bb613949c605ed7fbeb07de81523e7e06b466321ce7989c1adae3072b48ef02bbd2e565ec5c7be522d050fdae3848955737a1f2dbadbf1dae222298b1e58dfada5277ad6c2deb82a86e6f166523982876c12a5789cc2a813e1bf0ee790af57bfdfa3cdc3b7e52e441ad3582d71078"}], 0x100}}], 0x4, 0x0) 09:35:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x40c00) r4 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r4) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xf}, 0x20000357) r9 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r9, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, r1, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r4, &(0x7f0000000280)='./file0\x00', r2, r3, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, r6, 0x1000) getgroups(0x2, &(0x7f0000000100)=[r3, r6]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x1, r1}, {0x8, 0x2, r7}], {0x10, 0x4}}, 0x34, 0x1) [ 142.452970] FAT-fs (loop4): unable to read boot sector 09:35:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000068be7931646586a66dcb0580eb6c3e902840290000000000000000000800150000000000"], 0x28}}, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x100000001, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @local}, {0x6, @remote}, 0x78, {0x2, 0x4e20, @loopback}, 'veth0_to_bond\x00'}) 09:35:22 executing program 3: syz_open_procfs$namespace(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000200000000002000000000100000f3d8f5e222909598598fea18bb413cd98ec4e9b915b16cbed64a2db61634fb37a035d84c290a2dab3a23ad3b4976d6a0cb35ba51038c2db001d9fcb1602b3be0a0496d3fec1e5b1571eb337970275f2d8d4cfe5e6466a33a4e904690427c18c1f1e14eb0d9"], 0x34, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) sendto(r0, &(0x7f0000000000)="5b890ff30db6a4170776a26ab9fc482c89d59839ea6650c4a1816e5d069eeb91653da9337205a13bc52509edfc061ecf21fde316bfd081ac320b371287e960d5d6d90a9cc909da0d96938fb1d1a095e7006eb0d9f1d5a756dd3d2a94bacca076174aa19096c38637b2abd7f6", 0x6c, 0x40000, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @multicast2}, 0x3, 0x1, 0x2, 0x1}}, 0x80) 09:35:22 executing program 0: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)}], 0x3}}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) wait4(r1, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001b00)=ANY=[@ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYBLOB="0a1da9ee18cff6bc6a83095a16d8e35857b4bc2097af31ac7986a65cad647484f90c9fd46fef259ad171921ffcec605b1e5398c51a4bd95b0e2492f55ac2cddab500c32ec94b"], 0x0, 0x69}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="0008bc962a", @ANYRES32=r4, @ANYBLOB="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"], 0x6b0}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0xff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() r7 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ptrace(0x10, r6) wait4(0x0, 0x0, 0x0, 0x0) 09:35:22 executing program 5: syz_open_pts(0xffffffffffffffff, 0x8601) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000740)={0x1, 0x70, 0x1, 0x1, 0x4, 0xfffffffffffffffa, 0x0, 0x1, 0x50080, 0x9, 0xa875, 0x7ff, 0x9, 0x2, 0x7, 0x2a, 0x101, 0x4, 0x7, 0x4, 0x8, 0x3, 0x2, 0x9, 0x7, 0x8, 0x2, 0x8698, 0x5, 0x8, 0x9, 0x8, 0x1, 0x101, 0x100000001, 0x3, 0x6, 0x48, 0x0, 0x8, 0x1, @perf_config_ext={0xfff, 0x1}, 0x2000, 0x0, 0x2, 0x7, 0x180000, 0x10001, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x53f43f85d1d7765f) r1 = dup(r0) utimes(&(0x7f00000007c0)='./file0/file0/file1\x00', &(0x7f0000000680)={{0x77359400}, {0x77359400}}) socket(0x10, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r3, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) lseek(r2, 0x0, 0x1) readahead(0xffffffffffffffff, 0x4, 0x2) sendfile(r3, r3, &(0x7f0000000440), 0x20) sendfile(r3, r3, &(0x7f0000000100), 0x7f8) mount(0x0, 0x0, 0x0, 0x2000080000003f7c, 0x0) pivot_root(0x0, &(0x7f00000002c0)='./file0/file0/file0\x00') r4 = dup3(r2, r2, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r6 = syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f00000003c0)='./file0/file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r10, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x9d\x90\x9f\xfd\xbc\xbe6i\xe5 \x9b\xb6\x99\xbb\xee#?\x81D\xcf\xe14\xdc\xec\x9a\xb7\x00\xe6\xdc\x1a\x83\xc0&\xc95\xc6%\xa3\xb8\x82 y\xcf\xcfz\xd2\x88\xa2,y\xbaE\xc4\x81\xa4Fn\x8c\x8c\xa1\an\xdd\xc9_\xb9\x11o\xe64\xdd9\xfa\xf0\xa3\xc9\xd2A{?>\x1e\x0e\xce\x99\xaa\x17`*}\x84\x8b\x1a\xd3o\x1d\x97\x83\xaeN-\x19\x15\x9b(\xb9\b\xce\xe3V\xd3E\xee\f\"\xb0\x88\x86m\xcdq4\xc6\xa1\xca\xa64D\x84c\x1f\xb0w\b\xaaX\x98\xd1[\xc7k\x00\x11\x8e#\xd8\f\f\xe13S\xd9?5K<\x13\x91\xf1\x8a\xc8\x12\xc8\xe1\xbc\x88\xcan\xb2\x04\x18\"\xd1Lg\xd1\xdb\xd3}\xab\x06\xd5\xad\x19\x9aCs+\xb6F\xae\xa5jn\x8f\xae\xa5\x87`\x04=+\x8b,Gr\xfcuh`\xc0\xfe\xdb Z\"\"[\xd30S\xf2\xc7\xf2@\xd9{\x8b&7\x84n7SCf\xa9\\\x18g\r\xdd\xbe^\xb8\xd8\x03Fi^\xe5a/\xba\xe9{\xcc\xea\x7f\x84b\x01\xda\xa1\xee+\xd2\x89\x02\x9d\xb5e>\xbe\x15\'s\xb9^\xd6{\xdb\xa2\xb5\xd3\fdC1\xb6\xdf\v\xae\xa3\xff\xaf);W\xe0\xb9X\xcbv\x0e@\a\x10\xc38l\x82r(\x19\x80\xc6\x83\xefT\xd1Xz-\xf2\xef\x9a\x14\x03\x86\xe5\xcc\xba|+\xd8\xb4\xda\xf6\x9a') fchdir(r0) r1 = memfd_create(&(0x7f00000002c0)='fd\x00\xa9:\xb3t\xca\xbf\xa2\xe0\xf8\xfd\xfb\xb9\x12\xfcT\xf5\x80\xc0\x8f\xff\xc7\xfb\xee\"\xa1\xff\x87\x87x\xd9\x0f\xa7\xbe4o\xc0\x82\x98\x94\xe4\x9c\xaf\'_L\x05\x02-\xfd\b]\xbe\b\x00\xb9\xc7\xe6\\\x98\xec[V_\x04Q\x869\xfdk\xe1\xf5M\x93\xef\x1a\xfb\x9ad]l\x93\x11\xe6O\x19;7f\x99\x8b\xa6\x0e\xcc\x8dw\xa1\xdb\xbc\x93\xa6i\xc1Xu\\\xf2V \n\x1c\xa0pM\xec5\n,\xe9?\xce\xbf\xb2o\xd5`\xba\xf9\xff\xa3\x88\xbf\x1b,S>\x9d\x90\x9f\xfd\xbc\xbe6i\xe5 \x9b\xb6\x99\xbb\xee#?\x81D\xcf\xe14\xdc\xec\x9a\xb7\x00\xe6\xdc\x1a\x83\xc0&\xc95\xc6%\xa3\xb8\x82 y\xcf\xcfz\xd2\x88\xa2,y\xbaE\xc4\x81\xa4Fn\x8c\x8c\xa1\an\xdd\xc9_\xb9\x11o\xe64\xdd9\xfa\xf0\xa3\xc9\xd2A{?>\x1e\x0e\xce\x99\xaa\x17`*}\x84\x8b\x1a\xd3o\x1d\x97\x83\xaeN-\x19\x15\x9b(\xb9\b\xce\xe3V\xd3E\xee\f\"\xb0\x88\x86m\xcdq4\xc6\xa1\xca\xa64D\x84c\x1f\xb0w\b\xaaX\x98\xd1[\xc7k\x00\x11\x8e#\xd8\f\f\xe13S\xd9?5K<\x13\x91\xf1\x8a\xc8\x12\xc8\xe1\xbc\x88\xcan\xb2\x04\x18\"\xd1Lg\xd1\xdb\xd3}\xab\x06\xd5\xad\x19\x9aCs+\xb6F\xae\xa5jn\x8f\xae\xa5\x87`\x04=+\x8b,Gr\xfcuh`\xc0\xfe\xdb Z\"\"[\xd30S\xf2\xc7\xf2@\xd9{\x8b&7\x84n7SCf\xa9\\\x18g\r\xdd\xbe^\xb8\xd8\x03Fi^\xe5a/\xba\xe9{\xcc\xea\x7f\x84b\x01\xda\xa1\xee+\xd2\x89\x02\x9d\xb5e>\xbe\x15\'s\xb9^\xd6{\xdb\xa2\xb5\xd3\fdC1\xb6\xdf\v\xae\xa3\xff\xaf);W\xe0\xb9X\xcbv\x0e@\a\x10\xc38l\x82r(\x19\x80\xc6\x83\xefT\xd1Xz-\xf2\xef\x9a\x14\x03\x86\xe5\xcc\xba|+\xd8\xb4\xda\xf6\x9a', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents(r2, &(0x7f00000000c0)=""/31, 0x77c) write(r1, &(0x7f0000000240)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b0000005f73bb4e50db805c0000f8bf54da32", 0xffe2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x3c) inotify_init1(0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x400000, 0x2) renameat(r3, &(0x7f0000000380)='./bus\x00', r4, &(0x7f0000000440)='./bus/file0\x00') setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) clone(0x802123001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./bus\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000500)=@v2={0x2000000, [{0x8, 0x10001}, {0x194, 0x6aa3}]}, 0x14, 0x2) write$selinux_load(r5, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffe55) request_key(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) execve(&(0x7f0000000580)='./bus\x00', &(0x7f0000000100)=[&(0x7f0000000640)='\x00'/11, &(0x7f0000000680)='ppp0eth1\x00', &(0x7f0000000340)='-\x00'], &(0x7f0000000c80)=[&(0x7f0000000300)='trusted\\\\ppp0eth0selfem1&[GPL#[selinuxeth1\x00', &(0x7f0000000ac0)='user\x00', &(0x7f0000000b00)='trusted\\\\ppp0eth0selfem1&[GPL#[selinuxeth1\x00', &(0x7f0000000bc0)='user\x00', &(0x7f0000000c00)='ib', &(0x7f0000000c40)='/proc/self/net/pfkey\x00']) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffdffffefff}, 0x4) r7 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r7, &(0x7f0000000040)={0x11, 0x0, r8}, 0x14) sendto(r7, &(0x7f0000000780)="4c00000000000000d92f69617b96577e2314edbbaf59575da591e1998e457029daf84a0c96b342acb347f9c32a5a127b5f07bfedca8d02dc17a347e42994eaf30fe9bcbe624aa4fd9e0ea223e0af73efbb0ad5ed08ae5fc06b27321a3b942aee8aaff226881920cdeb2e524ffaef59747c907e53d71a2ebd197e2e59769624d2288369d976f4d6df17247fff43cbdf8b5a21866ff96ed280142d89934fd48b0e84282eb9848304305bc776c203485dd4ddd217dfaa03d71df8515c9cf1ee8f3925482126fb01d4ef47d9ecb22ec697908b68ef4a5ba76d815c66a32a3090cbcbec1c5bd1ac87c93c", 0xe8, 0x0, 0x0, 0xfffffffffffffed0) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r9, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r9, &(0x7f0000000080)={0xf}, 0x20000357) r10 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r10, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in6=@local}}}, &(0x7f0000000140)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653d303030303030303030301a0f99fc879bae9d39b406f94daa52303030303030303034303030302c757365", @ANYRESDEC=r6, @ANYBLOB='+group[id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,allow_other,allow_other,allow_other,\x00']) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r7, 0x11, 0xb, &(0x7f0000000380), &(0x7f00000002c0)=0x4) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000f80)={0x2, 0x80000001, 0x40, 0x3ff, 0x2, 0x5}) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount(&(0x7f0000000f00)=ANY=[@ANYRESOCT=r4, @ANYRES16=r7, @ANYPTR64, @ANYRES32=r3, @ANYRESDEC=r4], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x200000, &(0x7f0000000d00)='-%\x00') mount(&(0x7f0000001080)=ANY=[@ANYRES64=r5], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000ec0)=ANY=[], 0x0, 0x0, 0x2004000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001040)='./file0\x00') mount(&(0x7f0000000e40)=ANY=[@ANYRES32=r8], 0x0, 0x0, 0x5012, 0x0) preadv(r8, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r9, r10/1000+10000}, {0x77359400}}) close(r0) 09:35:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x880000000107) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100), 0x0) bind(0xffffffffffffffff, &(0x7f0000000340)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='attr/exec\x00') getdents(r1, &(0x7f0000000180)=""/31, 0xffffffffffffff4d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="5004aee564df371de87d5829f0b9f00579c91fde84631bdd431b57cf963ea1e4c6439b5cbfce5057bfafbc5ea5fe4590689854fa72f0559b521cd15c6cf6c87b7895d1e845953f07cd2b98f1fffe78a08d29411a865ea1177e2b91c64fb4b7b04c3a3b48ac", 0x65, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0x11) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r2, r3, r5) r6 = getuid() r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) fchdir(r10) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r9, r11, 0x1000) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="ed86ee7b480b3658f7162e6e0000", @ANYRES32=r3, @ANYBLOB="02000300", @ANYRES32=r8, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="020001e5", @ANYRES32=r9, @ANYBLOB="040000000000000008000300", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r5, @ANYBLOB="10000000000000002000000000000000"], 0x64, 0x2) keyctl$instantiate(0xc, r2, &(0x7f0000000040)=@encrypted_load={'load ', 'default', 0x20, 'user:', '\xb8proc', 0x20, 0x2, 0x20, [0x64, 0x33, 0x36]}, 0x31, 0xfffffffffffffff9) 09:35:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r1, r2, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r3, r4, 0x1000) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, r6, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) r7 = geteuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigpending(&(0x7f0000000440), 0x8) setreuid(r7, r8) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 09:35:25 executing program 5: r0 = socket$inet6(0xa, 0x2000000080803, 0x2f) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r4 = openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="5004aee564df371de87d5829f0b9f00579c91fde84631bdd431b57cf963ea1e4c6439b5cbfce5057bfafbc5ea5fe4590689854fa72f0559b521cd15c6cf6c87b7895d1e845953f07cd2b98f1fffe78a08d29411a865ea1177e2b91c64fb4b7b04c3a3b48ac", 0x65, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r3, r4, r5) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r3, 0x7, r6) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7e49b75c5fd21dacb7b35ad299fcbc3b5bf61816d9162b65bbec7591e37fe671813b277929434509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23136f1c2138cdbb1800000040000000000000", @ANYRESHEX, @ANYRESHEX], 0x0, 0x76}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r0, 0x26) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000000)='./file0\x00', 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4024) 09:35:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r1, 0x0) listen(r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000040)) 09:35:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) write$selinux_load(r1, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f030002000000"}, 0xff) 09:35:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x800, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="34bce20e5a5aa1c3810000000000006e44f74e9b3ca48c2e0ed7247e344ff38a533c19ffba427161f68dc6ef1751880000000000", @ANYRES32=0x0, @ANYBLOB="20000000cab541b4681173360bc38fae7ab4634700000000140012000c000100697036746e6c000004000200"], 0x34}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x8, &(0x7f0000000000)=""/33, &(0x7f0000000100)=0x21) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = dup2(r2, r3) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) r5 = fcntl$dupfd(0xffffffffffffffff, 0x71e24c165dff8407, r0) ioctl$BLKFRASET(r5, 0x1264, &(0x7f0000000040)=0x3f) ioperm(0x8, 0x7ff, 0x2) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0xef3c0abdebe60c10) 09:35:25 executing program 1: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="f95b0f34"], 0x4}}, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xf}, 0x20000357) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRESOCT=0x0, @ANYPTR64=&(0x7f00000001c0)=ANY=[], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES16=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYBLOB="adf7251611f45d621f5c110ccee5ed481c4b14f094b75aed3deadf251f49fbba70edf1ab82bdc8cc9665"], @ANYPTR, @ANYRES16=r7, @ANYRESDEC, @ANYRES64=r1, @ANYPTR, @ANYBLOB="8c583d540899812be2d9c53480e15945a875757d00da22c37e3b06571404d6aa5a", @ANYRES64], @ANYRESHEX=r8, @ANYBLOB="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"]], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES64, @ANYRESDEC=0x0, @ANYRESHEX, @ANYPTR64], 0x0, 0x140, 0x0, 0x400000}, 0x1d) wait4(0x0, 0x0, 0x80000000, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r10, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r10, &(0x7f0000000080)={0xf}, 0x20000357) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r10, 0x28, &(0x7f0000000040)}, 0x10) ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r0, 0x30) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r9, 0x0, 0x0) 09:35:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x0, 0x0, 0x7}) 09:35:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_int(r0, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000140)=0x4) 09:35:26 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4) unlink(&(0x7f0000000180)='./file0\x00') stat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000540)) [ 146.431351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23130 sclass=netlink_route_socket pig=4530 comm=syz-executor.3 [ 146.456104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23130 sclass=netlink_route_socket pig=4530 comm=syz-executor.3 09:35:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x2000884d) 09:35:28 executing program 2: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002b0000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x360b0000) iopl(0x0) 09:35:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x4000000000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0xdc0adac37ce9fae0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x7, 0x9, 0x8000, 0x4, 0x0, 0xffff, 0x400, 0x8, 0xd58d, 0x1, 0x1ff, 0x2, 0x80000000, 0x3, 0x8, 0x8, 0x7f, 0x0, 0x3f, 0x3f, 0x0, 0x3ff, 0x87b0, 0x81, 0x3, 0x1, 0x6, 0x401, 0x9, 0xffff, 0x3f, 0x3, 0x800, 0xb184, 0x101, 0x1a, 0x0, 0xb3, 0x7, @perf_bp={&(0x7f00000000c0), 0x2}, 0x30404, 0x7ff, 0x9, 0x8, 0x3ff, 0xff}, r2, 0xf, r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) sendmmsg(r5, &(0x7f0000000380), 0x0, 0x0) 09:35:28 executing program 1: socket$netlink(0x10, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = dup2(r0, r1) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000080)) memfd_create(&(0x7f0000000040)='\x00', 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000100000045000000b74d1a3819000a000600000021fd17e5ffff0606040000000000000000", 0x39}], 0x1) 09:35:28 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d2d2bb025a7180"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRES16=0x0, @ANYBLOB="9c362dc6ea3930f2979db4b2055d848538df21a8c1e63674e01c375e21a8c6a49e8bec312540cf8408000000000000000000c76873f0fbe5e26196fd3c050000925b80515539b73c096d7092f3c9a73969aebba58f04b95f25866a22302de8d0ad473e937bdcc99ae3d4cf94e0e6234fa2a7967443b809060000f8b94784a5f1ac165735e7c5d780188fb7469ca95c97feca9e7fccca392df0400e2d4a2f84c90000000000", @ANYBLOB="e6c55c669eb82eec5101000180437a7462010000000000000029a741efca44f937d0492482"], 0x0, 0xa2, 0xfffffffffffffe35}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87ffd) sendfile(r1, r2, 0x0, 0x800000000024) 09:35:28 executing program 3: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/access\x00', 0x2, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x2) r0 = gettid() tkill(r0, 0x1000000000016) r1 = getpgid(r0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) r7 = gettid() tkill(r7, 0x1000000000016) ptrace$setopts(0x4200, r7, 0x0, 0x100000) openat$cgroup_ro(r6, &(0x7f0000000440)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 149.300293] audit: type=1400 audit(1567935328.815:20): avc: denied { write } for pid=4563 comm="syz-executor.1" path="socket:[11874]" dev="sockfs" ino=11874 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 09:35:28 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:28 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000003840)=ANY=[@ANYBLOB="0000000000001000"], 0x8) r1 = dup2(r0, r0) getsockopt$inet6_opts(r1, 0x29, 0x36, 0x0, &(0x7f0000000140)=0x2b9) [ 149.335667] audit: type=1400 audit(1567935328.855:21): avc: denied { wake_alarm } for pid=4564 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 09:35:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) r1 = gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0'}, 0xb) geteuid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xffffffffffffff37, 0x1f, 0x1, 0x2}, 0xf) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(r1, &(0x7f00000000c0)='net/rt_cache\x00') ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000100)) chown(&(0x7f0000000080)='./file0/file0\x00', r2, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 09:35:31 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000005c0)={0x6, 0x1ff, 0x10001, 0x3, 0x13, 0x8000, 0x6, 0x1, 0x7, 0x86, 0x1f, 0x1}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x82) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r3, 0x80e85411, &(0x7f0000004540)=""/65) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000001180)=[&(0x7f0000000980)='/dev/vga_arbiter\x00', &(0x7f0000000c00)='/dev/vga_arbiter\x00', &(0x7f0000000c40)='@&{)-!nodevcgroupsystem&-#)eth0\x00', &(0x7f0000000c80)='/dev/vga_arbiter\x00', &(0x7f0000000cc0)='/dev/loop#\x00', &(0x7f0000001140)='posix_acl_accesskeyringGPLwlan1$#\x00'], &(0x7f0000001340)=[&(0x7f0000001200)='/dev/vga_arbiter\x00', &(0x7f0000001240)='/dev/vga_arbiter\x00', &(0x7f0000001280)='/dev/vga_arbiter\x00', &(0x7f00000012c0)='security\x00', &(0x7f0000001300)='user\\\x00'], 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000d00)=[{0x0}, {&(0x7f00000009c0)=""/225, 0xe1}, {&(0x7f0000000ac0)=""/215, 0xd7}, {&(0x7f0000000bc0)=""/11, 0xb}, {0x0}], 0x5, &(0x7f0000000380)=""/77, 0x4d}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002500)=""/73, 0x49}], 0x1, &(0x7f00000026c0)=""/4096, 0x46c}}], 0x2, 0x0, &(0x7f0000003780)={0x77359400}) r5 = memfd_create(&(0x7f0000000e00)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05\xc4\xc5bZ\xe8\xf8\xe5\xde\xb5\x7f3\xc8\x1e\aY\xcf\x15ug=5\xfd\xdd\xd1Gt\xfbI\x97\"\xe8\xca:h\x01\x89\xc6\x89Yj\x80\xf2\xea\xf6\xe6\xc7\t\x1c\xe9x:\xa2\xf2\x8e\x0ep\x98\xf1\\\x90\xd4#\xbb\x0e\xcf\x9f\xf8d\xcf%vD7\xaeN\xf11\xda\xb6\xbf\xe7\x80)\"i\xa6\x111\xc7\xb6\x9b\xa0c\xd4\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(r4, r2, &(0x7f0000000400), 0x20002000006) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x4) recvmmsg(r4, &(0x7f0000004280)=[{{&(0x7f00000002c0)=@nl=@unspec, 0xffffffffffffff9c, &(0x7f0000000e80)=[{&(0x7f00000000c0)=""/29, 0x1d}, {&(0x7f0000000600)=""/162, 0xa2}, {&(0x7f00000006c0)=""/208, 0xd0}, {0x0}], 0x4, &(0x7f00000037c0)=""/155, 0x9b}, 0x4557}, {{&(0x7f0000000f00)=@hci, 0x80, &(0x7f0000000100)=[{0x0}, {&(0x7f0000003a40)=""/15, 0xf}], 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003c00)=""/193, 0xc1}, {&(0x7f00000001c0)=""/19, 0x13}], 0x2}}, {{&(0x7f0000003e80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004240)=[{&(0x7f0000003f00)=""/218, 0xda}, {&(0x7f0000004000)=""/226, 0xe2}, {&(0x7f00000041c0)=""/96, 0x60}], 0x3}}], 0x4, 0x2000, &(0x7f0000004380)={0x77359400}) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000043c0)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000280)=0x4) getsockname$inet6(r7, &(0x7f0000000500)={0xa, 0x0, 0x0, @dev}, 0x0) r8 = getpgrp(0x0) write$P9_RLOPEN(r3, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x3, 0x3, 0x4}, 0x7}}, 0x18) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000240)={0x3, 0xffffffffffffff12, 0x0, 0x0, 0x1a, 0xff, 0x2, 0xffff, 0xdf71, 0x77822a99, 0x9, 0xe036}) getpriority(0x2, r8) ioctl$LOOP_GET_STATUS(r6, 0x4c03, &(0x7f00000007c0)) r9 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(r9, 0x401054d6, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x240}, {r1, 0x1000}, {0xffffffffffffffff, 0x3000}, {0xffffffffffffffff, 0x10}, {0xffffffffffffffff, 0x2005}, {}, {}, {}, {}], 0x9, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000006940)={0x0, 0x0, &(0x7f0000006900)={&(0x7f0000001600)=ANY=[@ANYBLOB="010020000000000008001c0080052bbfffaf83fc9a7aad5b289dbbc1214992f850caea477ce533e1acca147a97ba708b101004ea283de32220009071a548bd97dfd4f2f25bb1837819d6896c2fe40a35a465354f57cb7fde843c09ce0404a5478575ad5af35dbe0748d3f53d525731bac5a2c8451dd06f791b48d66fc30300ea000000000081045bc436a9429f0660fa9621fb4ecd8a60d3a80775b5324682c44ea942c8a80a2e7f80c1fa997ec887e64339a4f3cf8fbaf89668c5ca99a7d88afba34a195199b77214f898c744e98f0957352490d00a7d7fd8a17562e56e0693ff8c5ab059e72fc0283417f61ed346e91fcbbbd21d046509851da17f697b4df478a2a352291a4a3f000010000000000000000000000000000000000000b447ec64d79a93cedf09d2c746020f00982d57de101ed8e615d4d39432bdd2be874d5582379e07aef4f860f386213f78911a030b9e7dbfc1a0834ea3d1196a349ad00df78fcd9957623cd4ea107d7e0319228da1b0c68d7ec33e2499d0c76f9a5fc5423d3a14d0b7f88157a577e315c5b8fdbaca9eb466ad2e1c0e0d6539362915548776fc0f5828078453662c3cd207f00cc7c11f86d9e246d1a6360723eec0e698a6b796bf5cb84f51c61b52fdebf4b15964e2983236dec375c24f9276906a5a45058cf61327c8aa0cf322f0a39a459cbc1ba50e9eb068f097da457986af1478eb6ed2d2ce4ed935c369aa36f5521108000000000000002df79f9ceeed57fc8b0ecf2f9ab2354173f68280a305c8e9e467b96f05bcefccef114b2d16c83bcd8eb154b27bb1a5ec138c1d6dacaa11e4d5c36868e387e43a537bd2a7a3ff79ec4a11b45d0a6f7ed7", @ANYRES32], 0x2}, 0x1, 0x0, 0x0, 0x8000}, 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x25, &(0x7f0000000940)={@multicast2, @multicast1, @loopback}, 0xc) 09:35:31 executing program 2: clone(0xc75e43cbae22cd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:35:31 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) rt_sigreturn() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0xc0040, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0x10, 0x80000000, {0x51, 0x8, 0x8, {0xc411, 0x8}, {0x6, 0xe81}, @const={0x46f0, {0xfffffffffffff800, 0x0, 0x4, 0x5}}}, {0x51, 0x1000, 0xfffffffffffffff7, {0x5, 0x9}, {0x401, 0xfffffffeffffffff}, @cond=[{0x1f, 0x1, 0x400, 0xffffffffffffffff, 0x2}, {0x1, 0x0, 0x80000000, 0xfaac, 0x33, 0x7}]}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000001c0)={0x400, {0x4, 0x6, 0x7, 0x8, 0x3f, 0x10001}}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f00000000c0)=0x54) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) 09:35:31 executing program 5: prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/215) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdI\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?V\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8gYo\xdc\xe3\xa7\xd0{\a\xf9\xe0\xdbM\x89\xeaB\x1dT:2\x93\xfa\x1f\xe5`\"\x87\xa82\x8d4\xf4\x05\xd9U\xb0\xbc\xa6\xe5=re\x11}\x03\xd7\xbd\x11o=\xc7\xf9j\x88{\xd6\xe2\xb5\xb74|U\x97\xa1\x8b\x89\x00\xec\xd5h\x9aiP\f\xcd\xf0pa\xdc\xd0\x92D\xd1\xbf5\xfc\xa3\xe3-\xf7\xb7\xa1\x1c\xa5ph\xf0\xa3\xd5\xf2}|\x03\x80\xb8\xa9\x00') ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000040)=""/56) openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) syncfs(r2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x1, "8785651699310301"}) 09:35:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x16}, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@mcast1, @in6=@ipv4, 0x4e22, 0x0, 0x0, 0xfff, 0x2, 0x0, 0x20, 0x11}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0xc96}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x2}}, 0xe8) getsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000000)=""/237, &(0x7f0000000100)=0xed) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) [ 152.320654] SELinux: duplicate or incompatible mount options 09:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x800, 0x9, 0x2, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000100)={0x0, 0x0, 0xa5, &(0x7f00000001c0)="273b87d52dec64e00c2ac9edd6be3e6e2a37e002e5a29e99fc21524fcb4279919c0a6d7d172d1d11fa0fade30d2ca6f14945312f50d8d3c36b9a5b8a1f4cfea25893f929fc6c6e2f3328e7804c2b8fa8d65ae8dcdd4a035abe1be734b5170f3b310f70f6f91fae02f91d4cb8941d3a85fc95c20b17f6aaf60c047e034693dbceac872d03c92510d70f98219dfa3f3bf05e40ebbd80926d3a0efae6153859d55081cc889913"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x11, &(0x7f0000b67000), &(0x7f0000000000)=0xfffffffffffffff5) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 09:35:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_cache\x00') lseek(r0, 0x62, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr, 0x4}, 0x6) listen(0xffffffffffffffff, 0x83) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x19, 0x20, 0x4, 0x6, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x40, 0x304, 0x0, 0x0, 0x38, 0x1, 0x0, 0xe627, 0x1000}, [{0x0, 0x8, 0x2, 0x4, 0x0, 0x75, 0x0, 0x1}], "fdac1d669ed0b7997ae865b830377a0700a249fef0931e0149969788d7f01ba939de3a5e48cf12f9d6b25e775ef30f2fa67f1b63d7bf0f844d7d362965ed6a4676171cd788d07693e0db9cf848c18863aa2cf90a28d27f61e59bfb064cb35200ca8c704d3bcaea28c5d907000084f564aa59856f8034e3916d847f59f47285b370a7473b699bb6f098dca741e7271ca032d8e2094d4a597269108f8e9ff6eb65aa4a4537e03cb969342fa4e6000cf4394f080ceb89acf73567f2b313f4ce9fd8535170a6e018426f3b3342ac091f11d298154c83ba9f43735318"}, 0x152) fchdir(0xffffffffffffffff) r1 = inotify_init() ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000082) write$nbd(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="674466980100000000000400020000006517a42ac4cb6a63d1a97a7e5a318100892eac4023d21affe238385d4de98c35d691bbbf35c5601687a77cfa847ae2650baf9a30278d1fa024fcfe7066c684647acd6cc190b98d33e70927f07bbf0021b09395720bc5f9f53a746c64135837298e0a27b7b952f5bffb1cdf4e6230f950d6392c633b85b16a4b57ec63da0cf343a0865fbf1d21048bf2c7be17ef00866078659ad48500"/177], 0x4d) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400, 0x0) sendfile(r2, r2, &(0x7f0000000200), 0xa198) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 09:35:32 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x10002, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001080)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f00000010c0)={@remote, 0x46, r7}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) preadv(r5, &(0x7f0000000e40), 0x0, 0x0) ioctl$int_out(r1, 0x2000005460, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/snmp\x00') unshare(0x40000000) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) sendmmsg(r1, &(0x7f0000000640)=[{{&(0x7f0000000380)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x3, 0xae9, "88a347641a82572ca5983901f9c2d1a9f9a840879cfffad8e00612489998ddd2f1178ae6a8c0b2179b657105ba4ded8655835b8135c76c683f245a6b547b65", 0x22}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)="df07c5dea6a62012caba400e2897b583ab9e3bd7bcf7731f26207a194509b34d35cd9d62c587f345ae2da87adb353f9791946b3e6b09ced86581fad0c54d292b3fad8483324dda54a6ac8ecc7623258ae78aafd282ce8d36da3b2abd07d0b0c17e7a294c2653ba3153f5fab8eccedae9feef316963512d6c6426aefa91f8c0", 0x7f}, {&(0x7f00000001c0)="bedccd", 0x3}], 0x2, &(0x7f00000004c0)=[{0x58, 0x2, 0x401, "41c911a05a10502ca72b3eb6c6c821fbcdb9ee4d95574fd97f437116310c5415acb1bd99a0c0f2ff2d5c384e6a253c245adc60745bc2b0e1d6bd42ab3606304650a5"}, {0x20, 0x100, 0xffff, "d3898d81007f6cb6d2"}, {0x40, 0x103, 0x50a, "9ca5b09d2aaa7681a978e03eca1d2a487081bb69dc17d71de8aa530f01e9678453125bcc281af7921b5917"}, {0xc0, 0x111, 0x6, "6e4c68c97a828ee72feaea685b502e9a617094864ee811f50aea630481554925d0b6f305fd303eaa96ce145ba0911055411c3a4cc60b2c7d69fdae2bf4acadbee986afc2d159dd0b1982ef460045161e91d316737dfc2d2dc69b7dbea8e1319ad53ebaa2384dc7d13858ecb5524e04b58a6b708bef0848943c2a64a553f00bb64934a8ef65f003e9300acfe36dad8957e0bff3f560263a2a8e3156d952bd3e86119720cb6f9fe8fa8db9a185"}], 0x178}}], 0x1, 0x40080c0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000240), &(0x7f0000000180)="462b0190b16b03f118ac8f326830b0a55da1da9c0c5012c200"/39}, 0x20) dup(r1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000000)="8f", &(0x7f0000000080)=""/112}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:dpkg_exec_t:s0\x00', 0x21) [ 152.453494] blk_update_request: I/O error, dev loop1, sector 0 09:35:32 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0xfffffffffffffcea) tee(r1, r0, 0x80, 0x8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r2 = syz_open_pts(r0, 0x0) readv(r2, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x54}], 0x100000000000036d) 09:35:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x12580, 0x0) fcntl$getflags(r0, 0x408) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x800) write$P9_RLERROR(r1, &(0x7f0000000080)={0x27, 0x7, 0x2, {0x1e, '\\securitysystemtrusted}@\xe6^user'}}, 0x27) 09:35:32 executing program 1: memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_buf(r2, 0x29, 0x15, &(0x7f00000000c0)="8eee7c3943ab5abbc2d4e1dd77f95f3510b060d01171e056a41baba44946030a42a415c19d079d1e5d5235621dc0d9c247d8e4fb0e67db87da75592742b1bb0d6c7796e1c2519c9bf405fd5cbd3923b101caeaf617b228b6fde569a71720e36b67d6ef9d3446408af87d8f5f64a70e6c528836d5a3e8a8667b8f98055e077ff0db3f3dc6e0be8a9be5c255f25764343118cb4721aa5915932cf5c9cc586121f8b97fb285a21cad1691fbfc424964c262b8cf1e21aeed6a12dabb50979087a2c4377824d84b", 0xc5) 09:35:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:32 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2200000088) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x16, 0x2, 0x1, "ef13b593ed0373840587a2fe56dd551b", "bf"}, 0x16, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x6, 0x20000) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) splice(r1, &(0x7f0000000200), 0xffffffffffffffff, &(0x7f0000000240)=0x4f, 0x9, 0x4) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x801) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) splice(r0, &(0x7f0000000600), r3, &(0x7f0000000640), 0x100000000000000, 0xb) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000280)={'bridge_slave_0\x00', 0x800}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) 09:35:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000080)="11f0a505ba583bcb7bf070") r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001080)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f00000010c0)={@remote, 0x46, r7}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) preadv(r5, &(0x7f0000000e40), 0x0, 0x0) ioctl$int_out(r1, 0x2000005460, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/snmp\x00') unshare(0x40000000) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) io_setup(0xff, &(0x7f0000000100)=0x0) io_submit(r1, 0x200001f5, &(0x7f0000001700)) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) io_destroy(r1) tee(r2, r0, 0x8, 0x0) vmsplice(r3, &(0x7f0000000140)=[{&(0x7f00000000c0)="06", 0x1}], 0x1, 0x0) 09:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={r1, r2+30000000}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ffffac14ffaa00000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 09:35:32 executing program 3: syz_open_procfs(0x0, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40059809}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x174, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa5c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x134a00000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc5a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xec7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd0b}]}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xad}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x975}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x60}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xeb}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x811) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/55, 0x37}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x2, &(0x7f0000000200)=""/134, 0x86}}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000002b80)=""/7, 0x7}}, {{&(0x7f0000002bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000002e00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002e80), 0x0, &(0x7f0000002ec0)=""/181, 0xb5}, 0xffffffff}, {{0x0, 0x0, 0x0}}], 0x5, 0x20, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8000, 0x0) setns(r1, 0x8000000) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r2) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r7 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r7, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES64=r1], 0xe}}, 0x0) exit(0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 09:35:33 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:33 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 09:35:33 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000036c0)={{{@in6=@empty, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000037c0)=0xe8) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedQ\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r2, &(0x7f0000002880)=""/135, 0xffffffa1) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r4, 0x1, 0x6, @local}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r6, 0x107, 0x6, &(0x7f0000002680)=""/190, &(0x7f0000002640)=0xfffffffffffffc63) r7 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r7, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001080)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f00000010c0)={@remote, 0x46, r7}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) preadv(r5, &(0x7f0000000e40), 0x0, 0x0) ioctl$int_out(r1, 0x2000005460, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/snmp\x00') unshare(0x40000000) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="f95b0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="7e499fe412b31c5c5fd21dacb7b35ad29999e5deb90bd622b9f4a177373afcbc3b5bf61816d9162b65cccc061c938047d9953b277929034509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23136f1c21122803ab2e3a", @ANYBLOB="9f338885b87b558d8aedcbb605ebcfca9ba7a5b7f64c56499a89d8f1e87738c76c"], 0x0, 0x7c}, 0x20) wait4(0x0, 0x0, 0x20000000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) ptrace$setopts(0x4206, r3, 0x1, 0x0) tkill(r1, 0x30) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 09:35:33 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 154.205409] SELinux: security_context_str_to_sid(unconfined_u) failed for (dev sysfs, type sysfs) errno=-22 [ 154.226904] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 09:35:33 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 154.292526] SELinux: security_context_str_to_sid(unconfined_u) failed for (dev sysfs, type sysfs) errno=-22 09:35:33 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 154.354778] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 09:35:33 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 154.414859] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 [ 154.471433] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 [ 154.648447] device lo entered promiscuous mode [ 154.775958] device lo left promiscuous mode [ 154.811371] device lo entered promiscuous mode 09:35:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001080)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f00000010c0)={@remote, 0x46, r7}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000001c0)) preadv(r5, &(0x7f0000000e40), 0x0, 0x0) ioctl$int_out(r1, 0x2000005460, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='net/snmp\x00') unshare(0x40000000) r8 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r8, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x10001) ioctl$TIOCEXCL(r1, 0x540c) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x80000000000000}, {0xfffffffffffffffc, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x1, 0x1}, {{@in6, 0x4d4, 0x2b}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0x100000000000027, &(0x7f0000000140)={@multicast1, @local}, 0xc) 09:35:34 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="091208ec2d809f28f3044101f29d7ab61634d12e56dee40d93c7f6cf3d400473fdeaaf47373102799f3854a356f5e4363443b83064e9318965244d329d10f3f256cc890528", 0x45}, {&(0x7f0000000000)=':', 0x1}, {&(0x7f0000000140)="1ed0c7541632af977ef3cf18787f1903c1d287df0893e061564ad352841998057f71b6ad45c03446df558b0dbd1f32d5c5e8a314fa9d78a0eeefa05160f642e702d8e799f52062b9ec0f37589999785e3f6ae52da90cfe0579c374d7967405f0c6e6a6d6da4f8d67b3b871de70b091a69c6b05ba5bbeea719cbea1b13ec2604788829acb1852bd5c5f95e6c3eecc822678676e17da1e9ef1f36ed32ca6504e93ca895bb7f0f55bbc1793680ef735b0924b1b39ce803411d8baae66680753bc81570e8615473bc4cae35a7d90d3e17820904c8ef618", 0xd5}, {&(0x7f0000000240)="1ec701576fe1e590447a31635e88dfe6f1d0725a142c7c70e6407520a69eb5348478113de7a8dfd5b7c036db17a63b0ca918a5b08de6f3026f30ba8117c683481a2180832de89dd36da01bba4856324e76acb2afe53a6e5519fc056816f26d974a887c953894c30eac7234b2819d3964262ad528f5be06022daf3a47e4ee901c40d1f9949231ee2df0b3ba3a24b41e4b10e7cc4a12b0bc127a6551664e3b7a69dfd4ee3e6f26f171a95ef8fcf6a34953c80253aa589cbd0f2619285c405fc955a361b6fad6fed0ca5935c62d4ed9be37727383c7d7f2a12a25076bba7372a43b78d1d488ba2a2c6d7c9a94585086f7cd22783f", 0xf3}, {&(0x7f0000000340)="f1ff49b3319b4d4c47c46416241460c85868dbd4c9c0958dcf7c9e80bafee76dddc1906c8bb8385d5fbf2e70a7ee80f955d20ca54854", 0x36}, {&(0x7f0000000380)="6756871e08a2141c5be68f063fed1f92698c494199b4cee7e6a0eae6d1b5e9f5da26fe2f144b23b7da1372", 0x2b}, {&(0x7f00000003c0)="f89e6a80792552e73adec54bfe323aabcf22d1817b12e2ba86c7611e9f658b7e0ba36218b52b0f9edd9325d2f403517994850e100fe97114ab35af007892c3cd04157496e4395064abb63c8331139627828159be6ae1ab5ea2fcb6594d72f39a6f4437426953b3a09b84bfe70eb21e7ca319b665dbb94f934f5d10353f6370394cdf38fbe74a193bdde26711ccdd460900da57f3e9af45384bd0c9d88154ef173af8948b", 0xa4}, {&(0x7f0000000480)="721e7e7a81e47f4aee0ba8a7594bd912e0e2efd0d049eba4df347fc2ea71ac604f3600a84beb247bae941a7652977e9f24318ca0ed4574c98908fae515bdef265c5f9673696ca54e7bb1ea75c409da147a2def77322ee0ff97f8dc13a127569ef630b3fc5544d572a184de8f3af3d3397e64abc406c01ed8d96103a74a93", 0x7e}], 0x8, &(0x7f0000000580)=[@tclass={{0x14, 0x29, 0x43, 0x4fe0}}], 0x18}, 0x40) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000640)=0x4) 09:35:34 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) recvmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/202, 0xca}, {&(0x7f00000003c0)=""/162, 0xa2}, {&(0x7f0000000600)=""/219, 0xdb}, {&(0x7f0000000700)=""/148, 0x94}, {&(0x7f0000000100)=""/80, 0x50}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x6, &(0x7f00000017c0)=""/121, 0x79}, 0x3a}, {{&(0x7f0000001840)=@can, 0x80, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/249, 0xf9}], 0x1, &(0x7f0000001a00)=""/196, 0xc4}, 0x5}], 0x2, 0x40, &(0x7f0000001b80)={0x0, 0x1c9c380}) renameat(r0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 09:35:34 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = dup2(r1, 0xffffffffffffffff) getsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2bb3c5a7100cd80"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="9c362dc6ea3930f2979db4b2055dc1e63674e01c375e21a8c6a49e8bec312540cf84b8c9dc76d29614c76873f0fbe5e26196fd9097fc8f925b80515539b73cbb6d7092f3c9a73969aebba58f04b95f25866a22302de8d0ad473e937bdcc99ae3d4cf94e0e6234fa2a796c91b8906737443b809735288a5556f027b811a8d18444d37ae919284117647df7583", @ANYBLOB="08ebf02de28d0000eaf1"], 0x0, 0x98}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:34 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 155.163134] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 [ 155.178369] input: syz1 as /devices/virtual/input/input16 09:35:34 executing program 3: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0x20000000000000cf, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0xfffffffffffffd9a) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14, 0x40000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001500)={0x0, @loopback, @multicast2}, &(0x7f0000001540)=0xc) sendmsg$nl_route(r2, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=@newneigh={0x68, 0x1c, 0x300, 0x70bd2b, 0x25dfdbfe, {0x2, 0x0, 0x0, r3, 0x8c, 0x2, 0x2}, [@NDA_PORT={0x8, 0x6, 0x4e21}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0xffff, 0x8001, 0x800}}, @NDA_IFINDEX={0x8, 0x8, r4}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_PORT={0x8, 0x6, 0x4e20}, @NDA_PORT={0x8, 0x6, 0x4e22}, @NDA_MASTER={0x8, 0x9, 0x9}, @NDA_VNI={0x8, 0x7, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x20040000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001e00)={@dev, @remote}, &(0x7f0000001e40)=0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r6, 0x0, 0x17, &(0x7f0000000200)=0x6, 0x2) setsockopt$inet_int(r6, 0x0, 0x12, &(0x7f0000000040)=0x3f, 0x4) bind(r6, &(0x7f0000000400)=@in={0x2, 0x4e20}, 0x80) shutdown(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x18004e20}, 0x10) recvmmsg(r6, &(0x7f0000000180), 0x400000000000370, 0x0, &(0x7f0000000100)={0x77359400}) r9 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x3}, 0x20398df8e2895402, 0x0) r10 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r10, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000001bff4)) accept4$packet(r10, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0xffffffffffffff9a, 0x800) 09:35:34 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 155.260084] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 09:35:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x180000) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x14e24}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 155.309819] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 [ 155.321099] SELinux: security_context_str_to_sid(root) failed for (dev sysfs, type sysfs) errno=-22 09:35:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x5, {0x3ff}}, 0x18) write(r0, &(0x7f0000000000)="1b0000001c00071bab0925000900070007ab08000200000000007e", 0x1b) 09:35:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x7}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x54, 0x0, &(0x7f0000000180)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000100)={@ptr={0x70742a85, 0x0, &(0x7f0000000080)=""/87, 0x57, 0x2, 0x37}, @fda={0x66646185, 0x3, 0x0, 0xe}, @fda={0x66646185, 0x2, 0x0, 0x40}}, &(0x7f0000000000)={0x0, 0x28, 0x48}}}, @request_death={0x400c630e, 0x3}], 0xcc, 0x0, &(0x7f00000004c0)="5173716e4036453f5371ebb028c557b56060162742088df8f71bf9e6db9b40042b8ab2cee8ac79b252ff32e1f717a10a004443562b3b097b3f0f68af16bf1ae64af90b6228ced4c5f0f14223bd9441cde1aeb27fea033691c4d04bb93d81ac008824c5de9daee2f056457aeb6df79bce9cd0127920596ed5009799ab5f34997377b2136f757ca48f8154be9a35a8465a391c50b7810f1170a15e8cd0a82c6d0d2247c0ff5d932a941596d5ef49b99407556c89665120e9bbfe07dea9e0a416457a07d151299ec4c4753948ac"}) 09:35:35 executing program 3: unshare(0x14010000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) r2 = getegid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f00000017c0)={0x3f, 0xf08c}) unlinkat(r3, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0_to_hsr\x00'}) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x801) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000540)=ANY=[@ANYBLOB="e4000000210000012abd7000fcdbdf25ac14141100"/32, @ANYRES32, @ANYRES32], 0x3}}, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) write$UHID_CREATE2(r4, &(0x7f0000000a80)=ANY=[], 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8607) mkdir(0x0, 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 09:35:36 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)) 09:35:38 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000040)=0xd0, 0xfffffffffffffe9d) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:35:38 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) 09:35:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) sendmmsg$unix(r1, &(0x7f0000000100), 0x0, 0x14) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00\xba\x0f)\xaa\xe7xr:\x16\xe7 -\xee\x1e\xd8\x93z`5\t<\x1aEN\xc5\xb0C\x98\xfb\x11\x1f\xf1\xba\x12r\x9f+a\xf7\xc8\xa7xg\xe6\x1f\x1fI@\x97\xdf\x827]7\t\xc3\xd7U\x01\x00\x00\x80\xc7\x84\xc5\xb0/\x13\xf5,\x00W \x12\xe9\x8b\xe5\xa6\f4\x02n\xc3#\'\xeb\xcd\xa7\xbbG\xa2A2\x92\xb0\xf0\'\xdbI\xc9)>\xa1\x17\x1e\x8a\x990\xef\xe2\x8fE\x93qD\x7f\x98\xe1i\xa9\xed\xed\xd96\xed>{\x01>\xaa\xc5n3a\xb0w\xbaj\xed\xbc\xcd\xce#\xc2l\xc10\xa4') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 09:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ptmx\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x1, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x990, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1283b05e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2562) ioctl(r2, 0x8912, &(0x7f0000001000)="0a5cc80700315f85715070") setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000083c66ed5b66cb5f63cdedb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff020000000000000000007f0000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100"/784], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000d80)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000fbff0001000000000000000000000000000000000000000000000000000080010000000000000000000000000000000000000400000000002000000000000000000000000000000000cf0000000000000000000000007fb593c60000000000000000000000000000000092dfc8107ac7b075a58b501b8082b9591fb3342abfaddac885c4e42390a4dc307674d9"], 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x5, 0x1, 0x8, 0x6}) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) 09:35:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x81, 0x6}) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r1, r2, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r3, r4, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r5, r6, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r7, r8, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r9, r10, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r11, r12, 0x1000) getgroups(0x7, &(0x7f0000000080)=[r4, 0xee01, r6, r8, r10, 0xee00, r12]) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r13, r14) clone(0x4020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, &(0x7f00000002c0)='\x1a\xa86\x8a\x9b\xf8]\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 09:35:38 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) [ 159.256119] input: syz1 as /devices/virtual/input/input17 09:35:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000640)=""/4096, &(0x7f0000000000)=0x1000) 09:35:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) io_setup(0x7, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x20000357) openat(r5, &(0x7f0000000780)='./bus\x00', 0x80001, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000880)='/dev/net/tun\x00', 0x1c0c0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r7 = openat$cgroup_ro(r6, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r8, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r8, &(0x7f0000000080)={0xf}, 0x20000357) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r9, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r9, &(0x7f0000000080)={0xf}, 0x20000357) r10 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r11, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r11, &(0x7f0000000080)={0xf}, 0x20000357) r12 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r12, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r12, &(0x7f0000000080)={0xf}, 0x20000357) r13 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r13, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r15, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r15, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r15, 0x6, 0x21, &(0x7f0000000040)="399b1913537af1bdbb1e02fc46428ed7", 0x10) io_setup(0x5c, &(0x7f0000000000)=0x0) io_submit(r16, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r14, &(0x7f0000000000), 0x1400}]) io_destroy(r16) io_setup(0x1000, &(0x7f0000000080)=0x0) io_submit(r17, 0x2, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000, r0, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 159.297935] proc: unrecognized mount option "¨6Š›ø]e!­?šteéòcÎZ%š" or missing value [ 159.335882] input: syz1 as /devices/virtual/input/input18 09:35:38 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000001800)="d2dcd8a7c690f9e3dd506f8bc503727a0b13bb51f16d813d36ebb8642ad799c2378dc64118a908429037302de1c522fa8e88d1852a853fbba969ff0026a675484ab5f1b61a104a49cb64ad3db4c2f6b71c716bb651504d91856c52d6d363d9909fa0", 0x62}, {&(0x7f00000003c0)="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", 0x15a}, {&(0x7f00000016c0)="8e39131ad236291cabe4275895d95032a8505711d044003bfb04740cc6ec5ea3926b75fefd0fdf9cc98fc19ff38a0d3be19eb3c6e8e0480e91570f2fe12bcfc29a69e8efa386f20eb423ed6eb272fc5e57c19c9918c399631d0cb03b0e5f2e954156ebe94ef1e3bb8d7a4c45fa176376f293aa3853f85344cff7ef9b8a1c", 0x7e}, {&(0x7f0000000200)="e94057ed6baf389f19128b7f6c32448b975dd61ec8a809e991ef2d2511e73aeb990306cb168b7cbd3a1c5c5711986360226470d250b92a672deca2ed007c9ae5ff3b864e9e", 0x45}, {&(0x7f00000005c0)="26b1bcf29faea9ab72ba47b449c37905d17f941e6c77c0f7623e16b48ff4fd847f7308c2afb08a8971e3199dbe7d117ef655a0fe027e143451ed6f0fd4f2564b6eb6fa90de865e86509ce5d86e4dc40728f53d31d2300478cadeb571ef38a5af01c56c662ed8f33d3b0a59589e44b8f7c0a2248d29d8a55809d7ab57afbd817259aef6a18af3334e0a81aebb7e5566e3a4d11e4ddcedf02ac9db9b863c32b83a6ddf8d14b526be8f2433e5ae39bb979ebed34ab485dda4e56637f1f4a5ea", 0xbe}, {&(0x7f0000000380)="c7020000afce25049c0879e7fa3009241b5d98d1fcd296630a8d185a11744648d67ae6c6434eb0b0799bc987448da999bef250f3d9629dfd47244c95", 0x3c}], 0x7}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @loopback, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000140)={@mcast1, 0x53, r3}) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}) setitimer(0x2, &(0x7f00000004c0)={{0x0, 0x2710}, {r9, r10/1000+30000}}, &(0x7f0000000500)) 09:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ptmx\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x1, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x990, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1283b05e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2562) ioctl(r2, 0x8912, &(0x7f0000001000)="0a5cc80700315f85715070") setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000083c66ed5b66cb5f63cdedb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff020000000000000000007f0000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100"/784], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000d80)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000fbff0001000000000000000000000000000000000000000000000000000080010000000000000000000000000000000000000400000000002000000000000000000000000000000000cf0000000000000000000000007fb593c60000000000000000000000000000000092dfc8107ac7b075a58b501b8082b9591fb3342abfaddac885c4e42390a4dc307674d9"], 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x5, 0x1, 0x8, 0x6}) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) 09:35:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x206, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) read(r1, &(0x7f0000000080)=""/192, 0xc0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0003493f1ec2cec9607e0800c4578ad7026b00576000cd020093dd86dd00008848ba6558301f729422ad6c688342b9c39e80aca4b1d8c426cdec09b4380452fd79867a3f5fa452060d297f9401b4e35eb9e68b9adf40551680107fdf79d1af8f84b514d9a34e56309ac9733dc87d4b6b0ae4acb3740f085a200000"], 0x8031c) 09:35:39 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x3840ca0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d0b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f00000005c0)=0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) keyctl$chown(0x4, r2, r5, r6) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r1, 0x0, r2}, &(0x7f0000000cc0)=""/4096, 0x1000, &(0x7f0000000540)={&(0x7f0000000500)={'sha224-avx\x00'}}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r7, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r10, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r10, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$GIO_FONT(r10, 0x4b60, &(0x7f0000000240)=""/230) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 09:35:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="b705fe1035b56dd6135f63dea13f735f9555fd873b3635582aca6d0e7439fb137c39e00196d5a01a841d38a9a164fbe1647802949b906ecf8ba0df86b542eede2986755eabc704780d9f02bf3818fb89bf298ec78ac5c121c3b159b31f88e1b629db4f9ef97d7d54ae6e6139794bd2b5a133bb5ba899e2ae8d5982fdfe195ab3d0fd6c17c708b601cb2d71f6bbed5df52c81f073b17f1a02ca41669127ea3ef25087ad06cb3536e079db7840018371184b1f53ff635253fe88d6301762e6ea"], 0x14}}, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'ipddp0\x00', 0x6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:41 executing program 2: listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/4096, 0x1000) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x8a) 09:35:41 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x5a) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000480)={0x0, 0x0, 0x7fffffff}) 09:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ptmx\x00', 0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x1, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0xfffffffffffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x990, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1283b05e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2562) ioctl(r2, 0x8912, &(0x7f0000001000)="0a5cc80700315f85715070") setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000083c66ed5b66cb5f63cdedb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff020000000000000000007f0000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100"/784], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000d80)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000fbff0001000000000000000000000000000000000000000000000000000080010000000000000000000000000000000000000400000000002000000000000000000000000000000000cf0000000000000000000000007fb593c60000000000000000000000000000000092dfc8107ac7b075a58b501b8082b9591fb3342abfaddac885c4e42390a4dc307674d9"], 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x5, 0x1, 0x8, 0x6}) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) 09:35:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in6}, {0x0, 0x0, 0x0, 0x0, 0x4}}, {{@in6=@local}, 0x0, @in=@local}}, 0xe8) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) setreuid(0x0, 0xee00) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000de00000000"]) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x3, 0x4) 09:35:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() lseek(r1, 0x8000000000000, 0x3) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) write$FUSE_LK(r1, 0x0, 0x0) 09:35:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x410, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') r1 = gettid() tkill(r1, 0x1000000000016) syz_open_procfs(r1, &(0x7f00000000c0)='net/ip6_tables_targets\x00') r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="b7932da8a779ccbadf2501000000080005000400000008000400040000001495dc2864938d71a61d49eb85c3b8e166158c77b8c69fefd924950a5cbc31cf5d10dcb25c8b38be75dc3543974e"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4) preadv(r0, &(0x7f0000000480), 0x10000000000000fe, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000000)) 09:35:41 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x203000, &(0x7f0000000100)={{'v\x04'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g\x8e\x8b\xf4\xa9zid'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x1f}}]}}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x917c8def0a1b262, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:41 executing program 3: r0 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x1ff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000200)=@known='system.posix_acl_default\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0x3, 0x9}}, 0x30) [ 161.629193] input: syz1 as /devices/virtual/input/input20 09:35:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) accept(r0, 0x0, &(0x7f0000000040)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x11adc2100c97606a, 0x0) openat$cgroup_ro(r5, &(0x7f0000000480)='cpuBstat\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000380)={'syzkaller1\x00', 0x1f}) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000440)=0x3, 0x4) fstatfs(r3, &(0x7f00000000c0)=""/64) write$cgroup_int(r2, &(0x7f0000000100), 0x12) 09:35:41 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedr0, 0x0, 0x8, &(0x7f0000000000)='cpuset{\x00'}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0xc513, 0x400, 0x80000001, 0x2, 0x0, 0x400, 0x8, 0xf, 0x767, 0xf1, 0x1, 0x542e, 0xfffffffffffffffc, 0x6, 0x5, 0xffffffff989fd654, 0x100000000, 0xea, 0x8a, 0x100, 0x2, 0x40, 0xe6d5, 0x3, 0x9f4, 0x7ff, 0x1000, 0x4, 0x2, 0x4, 0x101, 0x92, 0xe2c6, 0x5, 0x3, 0x80000001, 0x0, 0x20, 0x3, @perf_config_ext, 0x90, 0xffffffffffffffe1, 0x40, 0xfb4ac58886169383, 0x4, 0x7ff, 0x7fffffff}) 09:35:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = gettid() tkill(r1, 0x1000000000016) ptrace$setsig(0x4203, r1, 0x7c, &(0x7f0000000140)={0x3, 0x4, 0x9}) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r3, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x104094, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x33, 0x37, 0x37, 0x35, 0x30, 0x34, 0x38], 0x2d, [0x62, 0x38, 0x0, 0x39], 0x2d, [0x32, 0x36, 0x64], 0x2d, [0x37, 0x62, 0x64, 0x36], 0x2d, [0x38, 0x36, 0x0, 0x34, 0x66, 0x66, 0x9d2d346d69e4b5a2, 0xf5ea36ffc3410307]}}}]}}) 09:35:44 executing program 1: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x9, 0x6, 0x22) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x17}, 0x5}, {0xa, 0x4e24, 0x5fc0, @remote, 0x13}, 0xffff, [0x6, 0x5, 0x9, 0xfff, 0x2, 0x6]}, 0x5c) fchown(r0, 0x0, 0x0) 09:35:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) close(r1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x2) getsockopt$netlink(r2, 0x10e, 0x2, &(0x7f0000000080)=""/96, &(0x7f0000000100)=0x60) inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x400003fff) close(r1) 09:35:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x100000000005}, 0x1c) io_setup(0x106, &(0x7f0000000140)=0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req3={0x3, 0xac7, 0x7, 0xfffffffffffffff7, 0x101, 0x2588, 0x7}, 0x1c) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f00000000c0)={'syzkaller0\x00', 0x1}) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="ab3015169aff330745e0e83326f94e22aa61329eca189ce67d3f7c2631d3f100c326fd05e3457f52", 0x28}]) 09:35:44 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) 09:35:45 executing program 3: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000008, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="d3e1bb03000000148c0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) r5 = gettid() sched_rr_get_interval(r5, &(0x7f0000000380)) ioctl$TUNSETOWNER(r4, 0x400454cc, r2) fsetxattr$security_evm(r1, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000440)=@v2={0x6, 0x2, 0x12, 0xfffffffffffffbff, 0x41, "d0efb090bc4e3e7e9b01e8ea39b10f65b8bb902a0c76d00743fe642d68dadd1e3a7df1d854f23d3882af0c539ad070a541bd0d8ca0c44283f565736e2386608c44"}, 0x4b, 0x2) setgid(r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:45 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\x00', 0x0) write(r0, &(0x7f0000000280)="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", 0xfffffffffffffde3) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x20004, 0x400011, r0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) 09:35:45 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x4000003, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff83c78b92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/137}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x68, 0x0, &(0x7f00000003c0)=[@request_death={0x400c630e, 0x2}, @free_buffer, @release, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000300)={@ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/58, 0x3a, 0x1, 0x1}, @fda={0x66646185, 0x0, 0x0, 0x34}, @ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/70, 0x46, 0x0, 0x16}}, &(0x7f0000000380)={0x0, 0x28, 0x48}}}], 0xef, 0x0, &(0x7f0000000440)="b16deebbd86f2351da3071d04ebd71f8dce4c530ca72946565579553fbb019043ef04e9a7a1ddf0c8df5e04236c4ae2e331875777c204d197b5204c603d9fabcefc9177bf97ddb11ad1f97c5c5eb6eacf1c88aed24bd98fb48c840799288386d00ec9208d1240ddaab2abafafbe9dbf933940c2647266364329c513050fe857c6995e00e2ddd9d80ffa14582eb056e63399f81a3292cdf39480290643a231616eb65d99dea4f1e19759ac1932971b5b4381ee252e15b2c5b5e1f0821dcb342b24e78fa5fcfbb7ac97522b2a8ee09f38885024e613ce22fc59497bf2410704fb3aaf7dc5f4b622ab859e2e3abb9c877"}) prctl$PR_SET_ENDIAN(0x14, 0x3) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@mcast1, 0x4e24, 0xfc, 0x0, 0x0, 0x2}, {0x6, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x9}, 0x0, 0x6e6bb5, 0x0, 0x0, 0x1, 0x2}, {{@in6=@loopback, 0x4d4, 0x6c}, 0xa, @in=@rand_addr=0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}}, 0xe8) init_module(&(0x7f0000000180)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0x48, &(0x7f0000000200)='\'*\x00') fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d0400b4f4d4f60000030000002272a062b49232e134e85da7bf155ef74de2d504f04c8379255ef57c4189149253303d25713090b4bab248e2be30a506272cd585c567") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 165.518837] audit: type=1400 audit(1567935345.035:23): avc: denied { module_load } for pid=5416 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1 09:35:47 executing program 2: io_setup(0x7, &(0x7f0000000300)=0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0xffff, 0x8}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3, 0x0, 0x8}, 0xc) fcntl$getown(r4, 0x9) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040)='A', 0x0}}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf}, 0x20000357) io_submit(r0, 0x212, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r7, &(0x7f0000000040), 0xfe84}]) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f00000001c0), &(0x7f0000000380)=0x4) 09:35:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000000140)=[0x80000001, 0x81]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r5, 0x0, 0x0, 0x14000101) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x7) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 09:35:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x802, 0x3ff800000000000) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="240000005e0007041dfffd946f610500070000001d0000007a000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 09:35:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)='+', 0x1}], 0x1}, 0xc100) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000a00)="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", 0x41a5}], 0x1) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:35:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000005c0)={0x6, 0x1ff, 0x10001, 0x0, 0x13, 0x8000, 0x6, 0x1, 0x7, 0x86, 0x1f, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000004540)=""/65) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000001180)=[&(0x7f0000000980)='/dev/vga_arbiter\x00', 0x0, &(0x7f0000000c40)='@&{)-!nodevcgroupsystem&-#)eth0\x00', &(0x7f0000000c80)='/dev/vga_arbiter\x00', &(0x7f0000000cc0)='/dev/loop#\x00', &(0x7f0000001140)='posix_acl_accesskeyringGPLwlan1$#\x00'], &(0x7f0000001340)=[&(0x7f0000001200)='/dev/vga_arbiter\x00', &(0x7f0000001240)='/dev/vga_arbiter\x00', &(0x7f0000001280)='/dev/vga_arbiter\x00', &(0x7f0000001300)='user\\\x00'], 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0)=[{{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000ac0)=""/215, 0xd7}, {&(0x7f0000000bc0)=""/11, 0xb}, {0x0}], 0x4, &(0x7f0000000380)=""/77, 0x4d}, 0xfffffffffffffff7}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002500)=""/73, 0x49}], 0x1, &(0x7f00000026c0)=""/4096, 0x1000}}], 0x2, 0x0, &(0x7f0000003780)={0x77359400}) r4 = memfd_create(&(0x7f0000000e00)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05\xc4\xc5bZ\xe8\xf8\xe5\xde\xb5\x7f3\xc8\x1e\aY\xcf\x15ug=5\xfd\xdd\xd1Gt\xfbI\x97\"\xe8\xca:h\x01\x89\xc6\x89Yj\x80\xf2\xea\xf6\xe6\xc7\t\x1c\xe9x:\xa2\xf2\x8e\x0ep\x98\xf1\\\x90\xd4#\xbb\x0e\xcf\x9f\xf8d\xcf%vD7\xaeN\xf11\xda\xb6\xbf\xe7\x80)\"i\xa6\x111\xc7\xb6\x9b\xa0c\xd4\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(r3, r1, &(0x7f0000000400), 0x20002000006) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4) recvmmsg(r3, &(0x7f0000004280)=[{{&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000000e80)=[{&(0x7f00000000c0)=""/29, 0x1d}, {&(0x7f0000000600)=""/162, 0xa2}, {&(0x7f00000006c0)=""/208, 0xd0}], 0x3, &(0x7f00000037c0)=""/155, 0x9b}, 0x4557}, {{&(0x7f0000000f00)=@hci, 0x80, &(0x7f0000003a80)=[{0x0}, {&(0x7f0000003a40)=""/15, 0xf}], 0x2}, 0x8}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003c00)=""/193, 0xc1}, {&(0x7f0000003d80)=""/19, 0x13}], 0x2}}, {{&(0x7f0000003e80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004240)=[{&(0x7f0000003f00)=""/218, 0xda}, {&(0x7f0000004000)=""/226, 0xe2}, {&(0x7f00000041c0)=""/96, 0x60}], 0x3}}], 0x4, 0x2000, &(0x7f0000004380)={0x77359400}) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000043c0)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x1f}}, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), &(0x7f0000000280)=0x4) getpgrp(0x0) write$P9_RLOPEN(r2, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x3, 0x3, 0x4}, 0x7}}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r6, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r6, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000240)={0x3, 0xffffffffffffff12, 0x0, 0x0, 0x18, 0xff, 0x2, 0xffff, 0xdf71, 0x77822a99, 0x9, 0xe036}) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f00000007c0)) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="b5d2bf3c38f10400cd803400"], 0xc}}, 0x0) [ 167.637302] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:35:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) listen(r1, 0x33ee3085) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r7, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r9, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r10, 0x0) r11 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r11, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 09:35:47 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0x4000000ff) close(r1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 09:35:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0xc40500, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='.\x00', 0x0, 0x4}, 0x10) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xec, r4, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xd20b}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffc}]}, 0xec}, 0x1, 0x0, 0x0, 0x20008812}, 0x80) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 09:35:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x290100, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) 09:35:48 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x280bb) fcntl$setstatus(r0, 0x4, 0x40400) 09:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000001040), 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) write$tun(r2, &(0x7f0000000080)={@void, @val={0x2, 0x1, 0x80000000, 0x0, 0x5, 0x9}, @llc={@snap={0x56, 0x1, "58ed", "6b2398", 0x575066f914728130, "f6928f1424bba94d9c192e804a98fbd5b85950feace1852ff8a17d6d1ec56a48d6eed11629f5"}}}, 0x39) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000040)) dup3(r1, r0, 0x0) [ 168.537376] tty_warn_deprecated_flags: 'syz-executor.3' is using deprecated serial flags (with no effect): 00008700 [ 168.558249] tty_warn_deprecated_flags: 'syz-executor.3' is using deprecated serial flags (with no effect): 00008700 09:35:50 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {&(0x7f0000000780)}], 0x3}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:50 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000140)='./file0/../file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000000)=0x7) tkill(r0, 0x39) ptrace$cont(0x20, r0, 0x0, 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:35:50 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) write$P9_RWALK(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="ace800006f010008000a030000000700000000000000ab04000000000000000000000001020000000200000200000000000002000000030000000000000000011000000800000000000000120300000000000000000000000c010000000100"/117], 0x71) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r1, r2, 0x1000) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) mount$fuse(0x0, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)='fuse\x00', 0x1000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1200000}}, {@blksize={'blksize', 0x3d, 0xe00}}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x90}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@obj_role={'obj_role', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bpf\x00'}}, {@uid_lt={'uid<', r4}}]}}) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x64dbca911e67e816, &(0x7f0000000100)=ANY=[@ANYBLOB="6d6fe777d75c303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303030303030303030303030312c09e9b7ee3d30303030303030303030303030303030303030303031302c6d6f64653d30303030303030303030303030303030303030303030352c6d6f64653d30303030303030303030303030303030303030303235342c736d61636b66736465663db2706f7369785f61636c5f6163636573732c6d61736b3d5e4d41595f455845432c00"]) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@known='system.posix_acl_access\x00') [ 170.758162] SELinux: duplicate or incompatible mount options [ 170.782497] audit: type=1400 audit(1567935350.305:24): avc: denied { setattr } for pid=5495 comm="syz-executor.4" path="/proc/5495/pagemap" dev="proc" ino=13966 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 09:35:50 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$P9_RLOPEN(r0, &(0x7f0000000300)={0x15f, 0xd, 0x2, {{0x8, 0x4, 0x6}, 0x8}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip6_tables_targets\x00') ioctl$TIOCGSOFTCAR(r1, 0x5419, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x80000, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0x2b, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="057bfedd356bc81f2820a00f0000000024f803df07be434a0020000367f4330010000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x3}, 0x1, 0x0, 0x0, 0x24000000}, 0x4001000) socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) lseek(r3, 0x0, 0x1) readahead(r3, 0x4, 0x2) sendfile(r4, r4, 0x0, 0x20) sendfile(r4, r4, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x2000080000003f7c, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) sendfile(r5, r6, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000400), 0x0) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) [ 170.820524] SELinux: duplicate or incompatible mount options 09:35:50 executing program 0: setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0xbf96060c648cd927) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:50 executing program 3: r0 = socket(0x1, 0xa, 0x2) r1 = gettid() tkill(r1, 0x1000000000016) timer_create(0x5, &(0x7f0000000040)={0x0, 0x3b, 0x0, @tid=r1}, &(0x7f0000000080)=0x0) timer_settime(r2, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="f4a3612f7f0ea159b481c06771e48799", 0x10) [ 170.975906] SELinux: duplicate or incompatible mount options 09:35:50 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd?', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',smackfsroot=&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset,defcontext=unconfined_u,defcontext=root,\x00']) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) r1 = accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r2, r3, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r4, r5, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r6, r7, 0x1000) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r9, r10, 0x1000) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r11, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r11, &(0x7f0000000080)={0xf}, 0x20000357) r12 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r12, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r14 = getegid() getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r15, r16, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r17, r18, 0x1000) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) stat(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r19, r20, 0x1000) getgroups(0x4, &(0x7f0000000280)=[0xffffffffffffffff, r18, r20, 0xffffffffffffffff]) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r2, @ANYBLOB="0e00179709ca9f88d47eebcf7a0600", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r6, @ANYBLOB="04000a000000000008000400", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r10, @ANYBLOB="08000300", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08000600", @ANYRES32=r16, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r21, @ANYBLOB="10000200000000002000020000000000"], 0x6c, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 09:35:50 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, r0, 0x1000) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '&posix_acl_accesseth0^systemeth0vmnet0eth0ppp1cpuset'}}, {@uid_lt={'uid<'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 171.114994] SELinux: duplicate or incompatible mount options [ 171.139565] SELinux: duplicate or incompatible mount options 09:35:50 executing program 0: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r0, @ANYBLOB="2ccb9cf0a29c4bc19b3d", @ANYRESDEC=0x0, @ANYBLOB="2c20dfc815ded7671ead1f69086f855cebe4c4335042726abb9b707db7096170b504eab10c955c6abfd5f55757554eb52a26960e7c3bdd567e0640f4a53e225f000000000000000000000000000018fc34b72a8fc930d2551b20edc97b58248ef7a0cdf66d4ba970daacbeae2505c6ea0a9f95bc84bb9f1dab00000200000000e13be9a4d0808930d1cd3c324825026dde462de013eb3143258e5898ad2952d10f07f524d7da3b1f663a9b79942c5badccdfd5b9a31173f6dd22f1edefbb739083ac5d8d11bb9df1d62b7c1a9d6415db00"/218]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) 09:35:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000204fcff", 0x58}], 0x1) socket$netlink(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 09:35:50 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x800, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x1, 0x7, 0xfff}, 0xc) 09:35:53 executing program 4: r0 = socket(0xa, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104fffffd3b000007110600f30501000b000600020223ca0000cf", 0xcc) 09:35:53 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = dup3(r1, r2, 0x80000) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_nat_t_port={0x1, 0x15}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 09:35:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$packet(0x11, 0x2, 0x300) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) fadvise64(r0, 0x0, 0x2, 0x5c52b6d0b0077b37) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000300)={r3, 0x3, 0x6, @local}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r4, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r5, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$PPPIOCDISCONN(r0, 0x7439) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 09:35:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000540)='ns\x00f\x82}r2\xf2\xf0|<\x14\x85H\x1c\xba\xb6\x06A\x92\xf9\xcc\x84\x8f\xd2~\x8c\x84r\xed\xca\xea\x159\xf0{\xa9\xc65\xd0\xad\xad\x18\x84\xed\"\f\xe5\x02k\xcdk\x1fNcr\x8d\xfd\x1bi\xb6\xaf*L\x9a_w\"\x8d?D\x8f[0\xd9\xb8\xbe^\x89\x9f\xf8\xed\xa1\xe7\xe1\x94J\xfd-\x84\x85\xd9\xa4\x15\xcf\xadP~N\xb3\x91\x8f:\x91\xe5\xbb\x8d\x142\x94}e\x98*H/BC\xdd,lm\xbd\x88\xf5\x85u\xc7C#&t\t\xa9(X:6\x95\xf4\xcd\x8fwX\x8f\xd3\xdeU\xfd\x9aJ,\xdb\x15\xaad\xb3LR\x8aXn\x13U\x93B\xd88\xd5\xf0\xc0$o\xec\x9az\x84\xa13\xe1\xabs\xe5\x9b\x17\xfaJ\x00\xacc\xae7@\xe1\x02\x85h\xab\xa3\x00\r\xce\xf4I]\xc6\xa4\xa9\xdd\xe91v\xc5\xdc:L[\xc8\xe4\xeb\xe1`\xfal\x8e') fstat(r0, &(0x7f0000005080)) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x20000357) signalfd(r0, &(0x7f0000000040), 0x8) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c736d616353245fb16f6f743d26706f7369785f29f46c5f6163636d7373657468305e73797374656d65746830766d7b65743065746830707070316370757365742c646566636f6e7465780600000000000000696e65645f752c646566636f6e746578743d726f6f742c00"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 173.997732] SELinux: duplicate or incompatible mount options [ 174.026302] mip6: mip6_destopt_init_state: state's mode is not 2: 0 [ 174.948615] ------------[ cut here ]------------ [ 174.953462] WARNING: CPU: 0 PID: 2110 at net/xfrm/xfrm_state.c:2192 xfrm_state_fini+0x2a0/0x340 [ 174.962386] Kernel panic - not syncing: panic_on_warn set ... [ 174.962386] [ 174.969765] CPU: 0 PID: 2110 Comm: kworker/u4:5 Not tainted 4.9.191+ #0 [ 174.976503] Workqueue: netns cleanup_net [ 174.980660] ffff8801a32f7900 ffffffff81b67171 0000000000000000 ffffffff82a3b340 [ 174.988667] 00000000ffffffff 0000000000000000 0000000000000009 ffff8801a32f79e0 [ 174.996675] ffffffff813ff0ca 0000000041b58ab3 ffffffff82e32ec5 ffffffff813feef1 [ 175.004669] Call Trace: [ 175.007234] [<00000000bb35e945>] dump_stack+0xc1/0x120 [ 175.012571] [<0000000082303cc8>] panic+0x1d9/0x3bd [ 175.017569] [<00000000be01c70f>] ? add_taint.cold+0x16/0x16 [ 175.023341] [<00000000e94e615a>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 175.030154] [<000000001ddb27a4>] ? xfrm_state_flush+0x1e3/0x310 [ 175.036273] [<00000000b9933754>] ? trace_hardirqs_on+0xd/0x10 [ 175.042220] [<00000000abbfb133>] ? __warn.cold+0x14/0x2f [ 175.047740] [<00000000a7e81dc5>] ? xfrm_state_fini+0x2a0/0x340 [ 175.053782] [<000000003b53ca16>] __warn.cold+0x2f/0x2f [ 175.059120] [<00000000f0f19bac>] warn_slowpath_null+0x2d/0x40 [ 175.065066] [<00000000a7e81dc5>] xfrm_state_fini+0x2a0/0x340 [ 175.070924] [<00000000fd92258e>] xfrm_net_exit+0x2e/0x40 [ 175.076445] [<0000000086aee4b9>] ? xfrm_policy_fini+0x320/0x320 [ 175.082564] [<00000000902a7f74>] ops_exit_list.isra.0+0xb0/0x160 [ 175.088771] [<00000000c51d5fbf>] cleanup_net+0x3d6/0x8a0 [ 175.094281] [<0000000080a2b086>] ? debug_object_deactivate+0x1e4/0x360 [ 175.101007] [<000000005b34ce0f>] ? net_drop_ns+0x80/0x80 [ 175.106526] [<00000000543d429e>] process_one_work+0x88b/0x1600 [ 175.112560] [<00000000e219056d>] ? process_one_work+0x7ce/0x1600 [ 175.118764] [<0000000048ba2ff3>] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 175.125231] [<000000009ab1a0fe>] ? _raw_spin_unlock_irq+0x28/0x60 [ 175.131527] [<00000000733369c2>] worker_thread+0x5df/0x11d0 [ 175.137314] [<00000000261e18d0>] ? process_one_work+0x1600/0x1600 [ 175.143620] [<000000000ff8c83b>] kthread+0x278/0x310 [ 175.148793] [<00000000aadbe8eb>] ? kthread_park+0xa0/0xa0 [ 175.154406] [<0000000001a65354>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 175.161147] [<0000000021d5d5e3>] ? _raw_spin_unlock_irq+0x39/0x60 [ 175.167442] [<000000001afa55f4>] ? finish_task_switch+0x1e5/0x660 [ 175.173746] [<00000000cfb3aa3c>] ? finish_task_switch+0x1b7/0x660 [ 175.180042] [<00000000d144d22b>] ? __switch_to_asm+0x41/0x70 [ 175.185902] [<0000000070517709>] ? __switch_to_asm+0x35/0x70 [ 175.191758] [<00000000d144d22b>] ? __switch_to_asm+0x41/0x70 [ 175.197634] [<00000000aadbe8eb>] ? kthread_park+0xa0/0xa0 [ 175.203259] [<00000000aadbe8eb>] ? kthread_park+0xa0/0xa0 [ 175.208886] [<0000000096f25fd1>] ret_from_fork+0x5c/0x70 [ 175.215051] Kernel Offset: disabled [ 175.218700] Rebooting in 86400 seconds..