x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:44 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:44 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:45 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000540)=""/205) r5 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r6, 0x0, 0x0, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000280)={0x2, {{0xa, 0x4e24, 0x1, @mcast2, 0xae88}}}, 0x88) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, 0x0, 0x0) getsockname$packet(r9, 0x0, 0x0) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r9, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4022000}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYBLOB="16a80bcf2841c82ff0160b8db0672c625d249027baeb2d8566acaa488f7fcf660d", @ANYRES16=r10, @ANYBLOB="000426bd7000fcdbdf2502000000080006000100000008000400fd0000000800040000000000080003000500000014000100fe880000000000000000000000000001"], 0x48}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r8, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r6, 0x401845e0, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000008008107002e2f66696c653082010000020200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e0000000000000005108f5807a832c3b2044771e00e0807002e2f66696c9843287caf3c1465300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c65300002000000070000000000"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r11, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) getsockname$packet(r0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000058) dup3(r0, r1, 0xc0000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000100)=[{r3}, {0xffffffffffffffff, 0x188}, {}], 0x3, 0x1) perf_event_open(&(0x7f00000001c0)={0x2, 0xde1f, 0x71, 0x7f, 0x0, 0x40, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1070}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, r3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(0x0, 0x0, 0x4182) r6 = memfd_create(0x0, 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 445.090230] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16680 sclass=netlink_route_socket pig=7217 comm=syz-executor.4 12:45:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 445.217352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16680 sclass=netlink_route_socket pig=7222 comm=syz-executor.4 12:45:45 executing program 5: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000001c0)) r0 = open(0x0, 0x141042, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockname$packet(r1, 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0xc001) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r2, 0x1, 0x3f, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) io_setup(0x0, &(0x7f0000000100)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000240)=0x4) unshare(0x60000000) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) 12:45:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:45 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x3cd, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="bf000000290000020000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c653000020000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c6530000200d742000000000000000000000000000000304e39cb1dd02b2200024080877e9d3b52878daa897b9ee2549e299ccb6f6214b5f4328f684b37d1d820fdc67782f9250d2a60e610655af182190ffd3949b49222dce93520a9423c08ee12bbad326f4c612b937e29c87d44142ad2eae900cfd12a141164b6b160e0c363d460fc0698a7d8195425faa49d0309693684a3e9fbe2fd12b320f3d6a50160d22472bf1f3a3ecc7ec0b2833aec89b8a285f27aa4c409a44af2eba5074701bb7c3bc4d62d874861954fbdbba6b098ba816c9b57aa28681c3039a0633fd09917f1df"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000240)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000200)=0x54) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f00000001c0)="8eca848f4239474c27d55330d7415984f11566a1c0") 12:45:45 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x80007, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0xa0af1d9766131599, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:45 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0xfe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x0, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:46 executing program 5: memfd_create(0x0, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100), 0x4) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/226) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x40) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000640)="49d9f3af7bdc9b99298eef26c1ba28274fa53c61ebd100000000800000000ce78a4f5f23d73df275e2e3705afeafdfbedbfa8b0bcab85526226740edacda37bc447d91029a2c9bb846d9195183e7d0458ac60216f53caa961cc08e0c9b1963dd3246bf2c8e9b2c", 0x67}, {&(0x7f00000006c0)="b0ef913113d90b38ea6bc92a1eccee66aacf2f16a4a859de06e58d112d914f0adabc0b65cbe304e09606d8f8033a11ae06e76d88024314f9db4ebd2efc366a30405acd114f0d56606fe15a22161ce6784ffc696981bafcab152d0b60289da7245a43abe7b1a61db13fecfd6754d81ffbe323944fb51df30bcfc64f0a0b6678cc58f0a73ab88c52a90e7ba35da9befd762f7a799d27386a69e781d0ec74e1229504d70398d7bb291d4004cd11c1e2e5b69495c1b254e122f79f8ce1ee78ae19b0250855a740e4e53ff62c97", 0xcb}], 0x2, 0x4) fgetxattr(r4, 0x0, &(0x7f0000001d00)=""/4096, 0x1000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0), 0x4) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f00000007c0)=ANY=[@ANYBLOB="500000001500d3930000000000000000ff0a0000000000000000000000000001ffffffff00"/58, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x50}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_buf(r6, 0x0, 0x0, &(0x7f0000000080)="6ed846e2dfe5f2b686727578", 0xc) fallocate(r2, 0x0, 0x0, 0x84003ff) write$eventfd(r0, &(0x7f0000000280)=0xffffffff, 0x8) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @rand_addr=0x4fb}}, 0x0, 0x40, 0x0, "30bbe9a78470f1d6562884859d3d21581250a985bb9752242eb7a7a6f318e3fc177d7c894a31fe14035ed658eec7efd703aeaf50f1fbceea95e691e624d356be9b000000000000000100"}, 0xd8) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') ioctl$GIO_FONTX(r7, 0x4b6b, 0x0) getdents64(r7, &(0x7f00000045c0)=""/4087, 0xff7) 12:45:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x0, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, 0x0, 0x0) dup(r5) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000008000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c650000000000000000000000000000000001002e"], 0xbf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r3, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(r3, &(0x7f00000000c0)='net/bnep\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_all\x00', 0x0, 0x0) r7 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, 0x0, 0x0) getsockname$packet(r8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r8, 0x6, 0x14, &(0x7f00000003c0), 0x4) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) 12:45:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x0, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8a001000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getaddr={0x14, 0x16, 0x530, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x7a1e08b99fa080c5}, 0xc09b8074b3feaca6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r3, 0x0, 0xffffffffffffffff, 0x3) write$FUSE_LK(r2, &(0x7f0000000300)={0x28, 0x0, 0x6, {{0x0, 0x3, 0x1, r3}}}, 0x28) r4 = syz_open_dev$loop(0x0, 0x0, 0x4182) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000480)) r6 = openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x200, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000700)=r6, 0x4) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000380)="e29598f78a6e6b6388b0a64e32df02170482baebe5aeaaf4fe1b1392818ef9c24338bc014e9b5ec7c2bff0e3b36a8739cceebde2f968e54129954e6c2de5fe76a03e8dac1e678e338d45ca7c7bfaae65bd4bc97dd55e7ba6099187613f6ea2a9404f259948e6ab7c18ce419ae85cfea7ff0a291c08bbeddcdfc4bed973175d52d379d7a076a8b57e61f74f50fba39dc0b6b63eb677847b2a9d52bbad471a7e691475551032138911111560840a98b09035f181b3eede54972cdcecb701551260b7debbbe9346fd216f124fcc0f277262cda19f632bd045d7ce2b3e4f77ba", 0xde, 0x8) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, r2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 5: memfd_create(0x0, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100), 0x4) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000002c0)=""/226) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x40) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000640)="49d9f3af7bdc9b99298eef26c1ba28274fa53c61ebd100000000800000000ce78a4f5f23d73df275e2e3705afeafdfbedbfa8b0bcab85526226740edacda37bc447d91029a2c9bb846d9195183e7d0458ac60216f53caa961cc08e0c9b1963dd3246bf2c8e9b2c", 0x67}, {&(0x7f00000006c0)="b0ef913113d90b38ea6bc92a1eccee66aacf2f16a4a859de06e58d112d914f0adabc0b65cbe304e09606d8f8033a11ae06e76d88024314f9db4ebd2efc366a30405acd114f0d56606fe15a22161ce6784ffc696981bafcab152d0b60289da7245a43abe7b1a61db13fecfd6754d81ffbe323944fb51df30bcfc64f0a0b6678cc58f0a73ab88c52a90e7ba35da9befd762f7a799d27386a69e781d0ec74e1229504d70398d7bb291d4004cd11c1e2e5b69495c1b254e122f79f8ce1ee78ae19b0250855a740e4e53ff62c97", 0xcb}], 0x2, 0x4) fgetxattr(r4, 0x0, &(0x7f0000001d00)=""/4096, 0x1000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0), 0x4) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f00000007c0)=ANY=[@ANYBLOB="500000001500d3930000000000000000ff0a0000000000000000000000000001ffffffff00"/58, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x50}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$inet_buf(r6, 0x0, 0x0, &(0x7f0000000080)="6ed846e2dfe5f2b686727578", 0xc) fallocate(r2, 0x0, 0x0, 0x84003ff) write$eventfd(r0, &(0x7f0000000280)=0xffffffff, 0x8) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @rand_addr=0x4fb}}, 0x0, 0x40, 0x0, "30bbe9a78470f1d6562884859d3d21581250a985bb9752242eb7a7a6f318e3fc177d7c894a31fe14035ed658eec7efd703aeaf50f1fbceea95e691e624d356be9b000000000000000100"}, 0xd8) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') ioctl$GIO_FONTX(r7, 0x4b6b, 0x0) getdents64(r7, &(0x7f00000045c0)=""/4087, 0xff7) 12:45:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:46 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf4cd8429b483bbdfbbc4ea403cb351953000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c653000020000004864dd78b2f8de16d7a7c19b49000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c6530000200"/207], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:46 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:46 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2c121}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x422}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c6530820000000002000000000000ac8cf79bb0a1b65514e80000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000100)=[{r5}, {0xffffffffffffffff, 0x188}, {}], 0x3, 0x1) perf_event_open$cgroup(&(0x7f0000000380)={0x4, 0x70, 0x1, 0x4, 0x0, 0x3f, 0x0, 0x1, 0x40400, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x3}, 0x8, 0x4, 0x7fffffff, 0x9, 0x7fffffff, 0x8, 0x2}, r1, 0xc, r5, 0x1) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) ioctl$FS_IOC_FSGETXATTR(r7, 0x801c581f, &(0x7f00000001c0)={0x1, 0x3, 0x2, 0x5, 0x9}) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:47 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:47 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r7 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r6, r6, 0x0, 0x24000058) fcntl$setstatus(r6, 0x4, 0x800) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66dd4ff1a0749b696c653082010000000200000000000000ff7f0000000000000007082e2f66696c653040020000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e0066696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c653000020000000700000000000000960000000000"], 0xbf) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000380)={0x0, 0x70, 0x8, 0x6, 0x2, 0x81, 0x0, 0x4, 0x10, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x8001, 0xffffffffffffff8f}, 0x547fc71bdbafdd67, 0xffff, 0x5, 0x1, 0x6, 0x1, 0x55ba}) prctl$PR_GET_FP_MODE(0x2e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r9, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0xffffffff, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffffffffffffd}, 0x20b) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68af3", @ANYRES16=0x0, @ANYPTR64, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad03000000dfdaf3d0fef215586de3c101", @ANYRESDEC], 0x0, 0x16a}, 0x20) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r4, 0x104, 0x70bd2a, 0x25dfdbff, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:47 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000380)="a69dbc1c0ceb7a13d3f293cb05d36f0c17749c13e312ede79ccb8d3718e640a29b2ce8ba43066ec78b83b2c593b9045250eeff8f5bbfd4b5ba18cc516f2e997aeea89083e7a75af24eeba4e9a433991a62014f7017b09aad118c6390682b69bb0cdb2041d3169e91a830d71bfb38f8977b00df3194227c1006365ff78e00000000000000003459db9ca1b38e880cc4e416f28705c5ca33e5da850e31c080f69dedf909d28dc1bdd33215c3442b51d816ef1fc5f291e554fd9ec4cb709eb964a8d887a69d62094725cee8e65d0435c41e7f33926185fca36f8f809bcfdf8938ca92506d1b03329487adb868c7d0352e0ebcc6151cf8782862c6", 0xf9}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) r4 = epoll_create(0x20) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x10000) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x24000058) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f00000000c0)={0x2000000c}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'veth1_to_hsr\x00', {0x2, 0x4e22, @empty}}) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 447.533598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7524 comm=syz-executor.5 12:45:47 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)=@newlink={0xe0, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0xc0, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xac, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @empty}, @IFLA_GRE_LOCAL={0x14, 0x6, @empty}, @IFLA_GRE_REMOTE={0x14, 0x7, @empty}, @IFLA_GRE_REMOTE={0x13, 0x7, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @empty}, @gre_common_policy=[@IFLA_GRE_TTL={0x8, 0x8, 0xff}, @IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x2}, @IFLA_GRE_OKEY={0x8, 0x5, 0xfffeffff}, @IFLA_GRE_ENCAP_SPORT={0x8, 0x10, 0x4e23}, @IFLA_GRE_ENCAP_FLAGS={0x8, 0xf, 0x1ff}, @IFLA_GRE_IGNORE_DF={0x8, 0x13, 0x1}]]}}}]}, 0xe0}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000940)=@getae={0x3d4, 0x1f, 0x1, 0x70bd2d, 0x25dfdbfb, {{@in6=@remote, 0x4d3, 0xa, 0x33}, @in=@multicast1, 0x7f000, 0x3505}, [@sa={0xe4, 0x6, {{@in=@local, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e20, 0x6, 0x4e21, 0x0, 0x0, 0x0, 0x80, 0xc, r9, r10}, {@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d6, 0xff}, @in=@broadcast, {0xff, 0x0, 0x9, 0xffffffffffffbbdc, 0x57, 0x5, 0xfffffffffffffe00, 0xc1}, {0x5, 0x2, 0x9}, {0x1f, 0x1, 0x2}, 0x70bd2d, 0x3505, 0xa, 0x3, 0x1f, 0x14}}, @algo_comp={0x1c0, 0x3, {{'deflate\x00\x01\x00'}, 0xba8, "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"}}, @algo_auth={0xcc, 0x1, {{'wp256-generic\x00'}, 0x418, "577a0c0b6a9d98125dd20d595d11494828d222ed5ed99b567ad9627e4c9508dbe2bd23192153a82bd449ba351c4a6764805c7a9d9ee7329d028e4a1e7bcc1f0431cddee985cad1423b6fbc83f4b3b0c0a90bd8f5807944c4869c719e6c75b3e261d238fc7922d386385a40dff2fc4218b95aac4280e0a462cdfdd6cf1b4aa30fbf7aef"}}, @encap={0x1c, 0x4, {0x1, 0x4e22, 0x4e24, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @output_mark={0x8, 0x1d, 0x80000000}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x20000000}, 0x2080) r11 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r11, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x1) r12 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r12, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r12) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r12, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r13, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r13, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) write$P9_RREADDIR(r13, &(0x7f0000000640)=ANY=[@ANYBLOB="2aa2544aff58129f47c9e0208b403a50f7140f1097bccc5f1e485a5a9d06ae104bd739915308a6291a71608051f51108a52d47708fcbe82dd2b426c08e68091d5c2e2a"], 0xb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r14 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r14, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000d9c7010000000000000000000000000000000000000000000095000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000800000000000000000001248d5b5000000000000000000000000000000000004002000"/192]) syz_genetlink_get_family_id$nbd(0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x0, 0x0, 0x2}]}) r2 = socket$inet6(0xa, 0x2, 0x0) close(r2) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r3, 0x200006) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x181201, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0xc0, "6bf386d9ad5d26ad753a0819873cbe78bc29ac521d28c63c6e92523741c64c6260a8cf6c49533cd2ab22a2fbe14f6ed8c10c65e4b5c84b1dd6ecaa3880bf4d4b06802d403419f2163da29835fa0466eead9ed7b80e600ee6b2bc51baf4a8e9d9d459cb747e6510b95251671b4b23e47f9ab816f28346071cc7fd49133a8760f1141fcd72b2e078e37e0264e7eb916b862c2047a19df1de06401f4b8f4864e02a909705dbb99d51571d609401e2d82a194ddab3df2f40f4a0801a2b75b9559e48"}, &(0x7f0000000040)=0xe4) 12:45:47 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) getegid() pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290800020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0300002e2f66696c65300002000000000000000000000000000000000000000001002eccb674648a3d5a90373a4340b82003fbc3f503fb4032ccdc892f74085590be5f006b497a1629b8b5c608c673a7d4d65e1b200f50b26b5a45f3fcb4f37b3a7e6018ee2c4257fefa5288e9cd9139bdcf8ff282914b3e2f6aaf1036"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 447.863289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=7538 comm=syz-executor.4 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 448.315269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=7561 comm=syz-executor.4 12:45:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r3, &(0x7f00000001c0)=@caif=@util, &(0x7f00000000c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000380)="45e41a917946c16fc250100a5ded0cf6cdfac1fba9073feda8e93ba4298a0e9b390667be50b034970456f2cbe135952e1d3870f786a1ee27cfc8c2059375913cf055142d073eff16efaeb961356008af50e370264fe14dfaa23d7540806a5506f9f58bdab3c305f400d84fc104fcf6e52cf299d987d9fe7a50cca7a5d4bedc6074b101597172fe353472e6f42c607f87bcc08f4a06570a332f53af3304616eb1ba61914ad6fd8d593a31a0"}, {&(0x7f0000000540)="21ce750ed15e698800b5d96886b6be071a22aab3a521ff1742cd47fc3a31b1cc3e9aef69c25a74e207dd71ea711a3d7470d7ef44c35f4c0da328c583299a9cea4a4ae4bb9d2861c4f6489159db2a8397e4560f4c01e23b635a6427fe4fabf67c0be6cd7207c263649462eb7715f138acca502bb98a3a2e8812a6370d06aa8e81c82ca0cf7be78cac61b2a83ed3acf33ddc9c80e111067213bb455fbecbab1c80af7f7da23f8fc4a6f6d6d85013d72b8ccbda68d8f14c85f5ce854bc36f612044da70309c4ad5da0bd5a53bc9b96f4c453746dc4101aa7044"}, {&(0x7f0000000640)="98270243da6decab4beb93ac7a182850a5d367462272872dea07ffd9d13f3806e3796fc26d6a8c0ee98b09e919d9417bc651be87276188f9905aef258ccbbfb275e98427524b4a8ca64ffd9a9a09ca94fa7cdad08cad34ea0904f52ebbda31f79b5daa6f920daf5e7ec25361ca1cc94469327efe534dbe86fa66c57dd68c442569bf9b054312bfd4f581b523f6b2984d74021683f22a3181"}, {&(0x7f0000000440)="791e6197d3ddfdf9a13e00a355395d694dada58fa1898dbc2fe17ac3316cea1da09fb77b37b1a074446e3edac7a6258e5526c81a731a6e0ba1c52cf5639834b8d58616b826e95a71c5388299d42ad39a53c5e2766f876898ec2edf1377985b9b860ea2dafc2d959aa5e273547e4d38884b5f6b74265b9dbb"}, {&(0x7f0000000300)="5d41c079f2d2ac9008d6090608c84fd1c36b9d1056e026"}, {&(0x7f0000000700)="7b23f9da1773648299c43eccef0ed91aca8855ba7e0c8e7b926ae1c824061b8b5a1bbe4304b2c0fc8effc16f99d03d3d7beea93a501369f57a530b4c38ef0984a7cf620bde44c810efc99851ef2357fbe5ed88572022c2cc5858cf4e7d8b65acab207da32066bc737a1681cc66c3f99587a5b3e2c1"}, {&(0x7f0000000780)="44e7995a80fcd38245f83b6d1215efe81999a977f0d56a13cb2429a67a2b5f7fce954ce297e848d512db240b28c54e27c98860f1b08bf018c3c56487acacf9676b5a981d6ae9012f3cda921d8f88ae525f640223666c19847631f71ab45b80e3f27fe748e7c14a18cfda88d8817ef4359053ab9b06a5cb32f207b93b27549400814f3e99c8836958eae1319494293a9b5ce9964bafac17a6e5dd"}], 0x100000000000007e, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x3090, 0x0, 0x4, 0xf, 0x6, 0xff, 0x5, 0xab}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xb, &(0x7f0000000100)=0x4, 0x4) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) socket(0x1, 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0xad4d996d0f2b6228) sendmmsg(r2, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r6, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe3a) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$packet(0x11, 0x2, 0x300) socket(0x1, 0x2, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r5, @ANYRES32=r0, @ANYBLOB="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", @ANYRES32, @ANYRES32=r8, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) 12:45:48 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r0, 0x2008002) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x80000000, 0x2, 0x4, 0x8, 0x400, 0x6785}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x12) mmap(&(0x7f000045e000/0x1000)=nil, 0x1000, 0x0, 0x1010, r2, 0xb564f000) 12:45:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:48 executing program 5: syz_open_procfs(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="530000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800040000000000"], 0x30}}, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) fchown(0xffffffffffffffff, 0x0, 0x0) getegid() ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000002c0)=0x80) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2000) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:45:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000007012780000008107002e2fc4cf6c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000001e07002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x0, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:49 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="bf0000002902000200000020000000000000000000009af2c4e9cf7d3dda256e82000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010309000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2e, &(0x7f0000000540)={0xb81, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 5: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000100)=[{r1}, {0xffffffffffffffff, 0x188}, {}, {}], 0x4, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$packet(0x11, 0x331c334ed926d4af, 0x300) ftruncate(r3, 0x2) getsockopt$inet_int(r2, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0xfffffffffffffe5d}], 0x1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/50) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r4, 0x0, 0x24000058) signalfd(r4, &(0x7f0000000300), 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x2, 0x70, 0x0, 0x3f, 0x8f, 0x40, 0x0, 0x98, 0x41000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0xb0, 0x5, 0x1f, 0x16, 0x6, 0x4, 0xc130}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 12:45:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 5: r0 = perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = epoll_create(0x4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000000000000000000000000000200000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000dc03e65bcc17f311e27490d39de1059bc677533e41456cd91a72aff268f31211eefc9b9d1a1384228f900b107d350761fcbba0787fe3c7e4d5892207d6717f22de9029e6ef3424fb7667b2e62e87fc36342c9d7e1c9185", @ANYRES32=r0, @ANYBLOB='\x00'/28]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r6) 12:45:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$TIOCCONS(r1, 0x541d) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x24000058) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000001c0)) r4 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r5 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r6, 0x0, 0x0, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r8, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r6, 0x401845e0, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r9, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000800000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c653000020000000600000000000000000000407443e0d2f751605e1b93d0a800000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}]}}, 0xa6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:50 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x16) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000300)={'nr0\x00', {0x2, 0x4e22, @remote}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000380)) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000540)='G\x98,\n\xf33*2\xbd\x15\xb6\xb1\b4\xc8\xadj\x03\f\\\xbd\\\xef\x7f\x1aW\xde\xa2A\b\x83\r\x1f\xe9\x17\xa9K\xda\xad\b\xb0\xdeO\x01\x01YG\xc5IO?\fn\xe0\xc7\x9c\x8e\x9e\xc6je\x8dr\xa8\xa8\rV\xf0\xa2\x03&\x1a\x9dgT)\x97\xe9\xa3n\xc0\xb3\xa6\tM\xb8\xed\xd3\x83\xec\x8e,G\x18XP\x80\xc5\xddhn]*\x89W\xe9qu\x13\xe2\xa7\x15u\xb4\x03\xf0-\xad\x89\xc7N\x19\xbe\xacyZBd\x00\x00\x00\x00\x00~\xa8~\x1dS\x89j\xab\x94\r\xa7B\x8b\xd0~In5\xea&6\nP\x9d\xd1&\xe2\v\x1fl\x9b\x1et\xcd\xe6E\xae', 0x6) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)=ANY=[@ANYRES64=r1], 0xfffffeed) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r7, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r7, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f00000001c0)={'gre0\x00', 0x400}) fremovexattr(r1, &(0x7f0000000280)=@known='user.syz\x00') syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:50 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, 0x0, 0x0) inotify_init1(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@local}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:54 executing program 5: r0 = perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = epoll_create(0x4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000000000000000000000000000200000000000000", @ANYRES32=r4, @ANYBLOB="00000000030000000000000000000000000000000000000000000000dc03e65bcc17f311e27490d39de1059bc677533e41456cd91a72aff268f31211eefc9b9d1a1384228f900b107d350761fcbba0787fe3c7e4d5892207d6717f22de9029e6ef3424fb7667b2e62e87fc36342c9d7e1c9185", @ANYRES32=r0, @ANYBLOB='\x00'/28]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r6) 12:45:54 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:54 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) clone(0x1000000000011, &(0x7f00000001c0), 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0xfffffffffffffffd, 0x2001000004, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_validatetrans(r5, &(0x7f0000000380)={'system_u:object_r:dhcpc_exec_t:s0', 0x20, 'system_u:object_r:device_t:s0', 0x20, 0x20, 0x20, 'system_u:system_r:kernel_t:s0\x00'}, 0x73) write$P9_RREADDIR(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="bf0000002902000200000020000000000000000000002e2f66696c653082010000000200000000000000fd7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000801fd2e2f66696c65300102000000060000000000000003000000000000000107002e2f66697f6530010300000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e00000000000000000000000000e8bc47acb59b2f8dd32e6a2a2df36f0026042729"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r5 = openat(r4, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) tee(r2, r5, 0x101, 0x1) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="bf0000002902000200000020000000000000000000009af2c4e9cf7d3dda256e82000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010309000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2e, &(0x7f0000000540)={0xb81, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000300)='/d{\x1c\xe7\xaf^\xfd\x93R\x00', 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000058) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet6_opts(r3, 0x29, 0x43, &(0x7f00000001c0)=@dstopts={0x88, 0x4, [], [@hao={0xc9, 0x10, @rand_addr="c1d52e72b4efba707fe9a54f67601730"}, @jumbo={0xc2, 0x4, 0x1000}, @jumbo={0xc2, 0x4, 0xd18}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, 0x30) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(0x0, 0x0, 0x4182) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0)=0x6, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$KDADDIO(r3, 0x4b34, 0xff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x185182) r7 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r5, 0x401845e0, 0x0) write$P9_RREADDIR(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf0000002902000200000020000000000000ca000000000000000000000000008107002e2f66696c653082010000000200000000000010ff7f0000000000000007000e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c653001035a1b2e5c2d50a5cc3600000007000000000000000cffffffffffffffc907002e2f66696c653000020000000700000000000000960000"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r9, 0x40b, &(0x7f0000000300)) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c65300c0000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000100000000000000000000000001002ee61330090c4658ea1060558a3b4918ba59c6e3ec063749a267e8ae7810e80bb916e368ecb26844b82bcf1bb46b6ccb999f566c40b3fa6375564b20089145acb6a5ac5a82623681cb589d60beb0f222b024d4717887b11a56ecc8b43a1303cbc861b7e663934e967d9a719f76309c1c5d020d68d6a71670773d4c0fce3743ff14b45c6f867f46669a0e94a0a379dc0e4a089e4b2b96fa52d40bd2cd80b66be940417a26b25eeac4ab466d117aecc52d73253455a7148ad707abb228c77d5b50a5974c2e081a616ae49a0089f6de034976b1382377bd1115a37c7820e3a1871cfdc6d0a2fe087d6a16a76a3d2b3149a5f20b45573415ea5799b288648e519619cc46020058ac1adf391e25edd9544ff30484d1ca69eef7e5a6fd"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 5: prctl$PR_GET_NAME(0x10, &(0x7f0000000340)=""/12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setitimer(0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x7530}}, &(0x7f0000000100)) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$TCGETS2(r5, 0x802c542a, &(0x7f00000001c0)) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) write$P9_RFLUSH(r4, &(0x7f00000002c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)={0x3, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3}) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r8}, {r9}], 0x2, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r9, 0x6, 0x23, 0x0, &(0x7f0000000240)) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) fdatasync(r7) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r10}, {r11, 0x42}], 0x2, 0x0, 0x0, 0x0) r12 = syz_open_pts(r11, 0x80000) ioctl$KDGKBSENT(r12, 0x4b48, &(0x7f0000000000)={0x8, 0x0, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000300)) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/d\xfb\xff\b\x00\x00\x00\x00\xfe\xff\x00', 0x10d002, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x5b, 0x40, 0x4, 0x8, 0x0, 0x3, 0x80000, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xd7cc, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x2, 0x6, 0xdd9f, 0x0, 0x8000, 0x6e7, 0x6}, r1, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000000c0)={0x6, 0x20}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r4, 0x0, 0x24000058) fsetxattr$security_evm(r4, &(0x7f0000000480)='security.evm\x00', &(0x7f00000006c0)=@sha1={0x1, "b0c090a873ffbac7332b1850c52da294b5e0aa32"}, 0x15, 0x2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x2400, 0x0) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000440)={0x1, 0x18, &(0x7f0000000400)="91e061df03950a926aa4468bfe2a3b62577ae4ebc018f3b1"}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) write$selinux_user(r8, &(0x7f0000000240)={'system_u:object_r:mail_spool_t:s0', 0x20, 'staff_u\x00'}, 0x2a) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r2 = dup2(r1, r1) write$P9_RMKNOD(r2, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x208000, 0x1) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0xffffffffffffff48}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) sendfile(r9, r9, 0x0, 0x24000058) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x8400) r12 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r13 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r13, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r12, 0x4c00, r13) r14 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r15 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r15, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r14, 0x4c00, r15) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(r16, 0x0, 0x0) r17 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r18 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r19 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r19, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r18, 0x4c00, r19) sendfile(r18, r18, 0x0, 0x24000058) r20 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r21 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r21, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r20, 0x4c00, r21) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000940)=ANY=[@ANYBLOB="060000000000000004000000000000000a00000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffffffffffff00"/28, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="0000000094b100"/28, @ANYRES32=r9, @ANYBLOB="00000000830a8000000000000000000000000000da00000000000000", @ANYRES32=r11, @ANYBLOB="00000000bf00"/28, @ANYRES32=r13, @ANYBLOB="00000000cb2a00"/28, @ANYRES16=r21, @ANYRES64=0x0, @ANYRES32=r0, @ANYBLOB="000000001500"/28, @ANYRES64, @ANYPTR, @ANYRES32=r17, @ANYRESHEX]) syz_open_pts(r1, 0x0) 12:45:55 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/508], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:56 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f00000001c0)={0x1, 0x3, 0x6}) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="bf00000029020002000400000000003a779f00008107002e2f66696c6530820100ff000200000000000000ff7f0040000000000007002e2f6669ef285d12c419640d00000000010000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffff6a0dad7b472ab4a6d0a9c90700846c6530000200000007000000000000009600"/191], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0xffffffffffffffda, 0x1, {0x0, 0x10}}, 0x20) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r2 = socket(0x3, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000540)={0x3, {{0xa, 0x4e21, 0x2fb9, @local, 0x4}}, {{0xa, 0x4e21, 0x4, @mcast1, 0x7}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(0x0, 0x0, 0x4182) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000200)={0x9, 0x200000, 0x0, 0x1, 0x9, 0x8}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400, 0x0) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000380)=""/211) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x0, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r0, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:56 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x200, 0x0) pidfd_send_signal(r1, 0x1d, &(0x7f00000001c0)={0x29, 0x5, 0x7}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x1, 0x1, '.'}]}}, 0xbf) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x800000, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000003, 0x11, r4, 0x7fff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r2 = dup2(r1, r1) write$P9_RMKNOD(r2, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x208000, 0x1) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0xffffffffffffff48}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) sendfile(r9, r9, 0x0, 0x24000058) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x8400) r12 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r13 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r13, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r12, 0x4c00, r13) r14 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r15 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r15, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r14, 0x4c00, r15) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(r16, 0x0, 0x0) r17 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r18 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r19 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r19, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r18, 0x4c00, r19) sendfile(r18, r18, 0x0, 0x24000058) r20 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r21 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r21, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r20, 0x4c00, r21) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000940)=ANY=[@ANYBLOB="060000000000000004000000000000000a00000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffffffffffff00"/28, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="0000000094b100"/28, @ANYRES32=r9, @ANYBLOB="00000000830a8000000000000000000000000000da00000000000000", @ANYRES32=r11, @ANYBLOB="00000000bf00"/28, @ANYRES32=r13, @ANYBLOB="00000000cb2a00"/28, @ANYRES16=r21, @ANYRES64=0x0, @ANYRES32=r0, @ANYBLOB="000000001500"/28, @ANYRES64, @ANYPTR, @ANYRES32=r17, @ANYRESHEX]) syz_open_pts(r1, 0x0) 12:45:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:57 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) syz_open_pts(r5, 0x200000) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r0, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r0, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x3f, 0xfe, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) write$P9_RUNLINKAT(r1, &(0x7f0000000300)={0x7, 0x4d, 0x1}, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) r8 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r9 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) sendfile(r8, r8, 0x0, 0x24000058) sendfile(r2, r8, &(0x7f00000001c0)=0x71, 0x401) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r2 = dup2(r1, r1) write$P9_RMKNOD(r2, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x208000, 0x1) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0xffffffffffffff48}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) sendfile(r9, r9, 0x0, 0x24000058) r11 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x8400) r12 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r13 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r13, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r12, 0x4c00, r13) r14 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r15 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r15, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r14, 0x4c00, r15) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, 0x0, 0x0) getsockname$packet(r16, 0x0, 0x0) r17 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r18 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r19 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r19, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r18, 0x4c00, r19) sendfile(r18, r18, 0x0, 0x24000058) r20 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r21 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r21, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r20, 0x4c00, r21) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000940)=ANY=[@ANYBLOB="060000000000000004000000000000000a00000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffffffffffff00"/28, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="0000000094b100"/28, @ANYRES32=r9, @ANYBLOB="00000000830a8000000000000000000000000000da00000000000000", @ANYRES32=r11, @ANYBLOB="00000000bf00"/28, @ANYRES32=r13, @ANYBLOB="00000000cb2a00"/28, @ANYRES16=r21, @ANYRES64=0x0, @ANYRES32=r0, @ANYBLOB="000000001500"/28, @ANYRES64, @ANYPTR, @ANYRES32=r17, @ANYRESHEX]) syz_open_pts(r1, 0x0) 12:45:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:57 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:57 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x102) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000001c0)) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x4182) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r5, 0x0, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r5, r2, 0x0, 0xc, &(0x7f0000000080)='/dev/ashmem\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x5, 0x1, &(0x7f0000000080)) 12:45:57 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x7f, 0x7, './file0'}, {{0x82, 0xffffffff, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xeb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x3) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='timers\x00') r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20006000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8f2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x81}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000090}, 0x40010) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(0x0, 0x0, 0x4182) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r7, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r7, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) write$cgroup_subtree(r7, &(0x7f00000000c0)={[{0x2b, 'cpu'}, {0x2d, 'cpu'}, {0xe6d461c46a2f18bf, 'pids'}, {0x2b, 'pids'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'pids'}]}, 0x2c) 12:45:58 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r11}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', r11}) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r11}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', r11}) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:58 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c651f01e322c4378acbea95000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8441}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) waitid$P_PIDFD(0x3, r2, &(0x7f0000000380), 0x40000000, &(0x7f0000000400)) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x8}, 0x10) ioctl$sock_ifreq(r1, 0x8921, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2000}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000300)={0x0, 0x0, 0xd0a, 0x0, 0x1ff}) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, 0x0, &(0x7f0000000540)=0xffffffffffffff83) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:58 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf00000029000002000000f0438bfd1cc91dc7000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000001000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e4e4a07ef92d5ca56f5b7a5e9aa314eedb0a0c137095548aeea7b5de69559651d39000000000000"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=""/45) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000001c0)={0x80, 0x31, 0xa85}) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0xc8, 0x2}, 0x8, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xfffffffeffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0xff, 0x2, 0x3f, 0x0, 0x1000, 0x400, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0xe37, 0x100}, 0x4, 0xffffffffffffff41, 0x1, 0x1, 0x180000000000000, 0x6, 0x8}, r1, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000001300)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x4182) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r8, r9) fsetxattr$system_posix_acl(r2, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x5, r3}, {0x2, 0x0, r4}, {0x2, 0x7, 0xee01}, {0x2, 0x4, r5}, {0x2, 0x2, r6}], {0x4, 0xe54460bf081a1fe2}, [{0x8, 0xe, r9}], {0x10, 0x2}, {0x20, 0x4}}, 0x54, 0x6) r10 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r10, 0x0, 0x0, 0x0) r11 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r12 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r12, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r11, 0x4c00, r12) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r12, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r10, 0x401845e0, 0x0) write$P9_RREADDIR(r10, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r13 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r13, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r0, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) close(r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000c80)={{0x0, 0x0, @reserved="9ef82a383b0ffafcc461d18bc47abce4784e1b54c6cf8325b294abb4e8fefc59"}, 0xff7, [], "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"}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) gettid() ptrace$setregs(0xd, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x80000) syz_open_pts(0xffffffffffffffff, 0x400) socket$inet6(0xa, 0x80002, 0x0) 12:45:59 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x40000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:45:59 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) write$P9_RLERRORu(r3, &(0x7f00000000c0)={0x20, 0x7, 0x1, {{0x13, '\\posix_acl_access]\\'}, 0x969b}}, 0x20) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x1000, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:45:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r3 = open(&(0x7f00000000c0)='./file0\x00', 0xc0400, 0x8) write$P9_RREMOVE(r3, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x2}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x5}, 0x0, 0x3, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000002800)=[{&(0x7f0000000380)="ba14005ba368522266906a592ac0d5935874e4f399ebf30d1fb741e206f9ccd725af87d00fc01cd999956629b49560a36681b6b48a2c241d88353cac2dc192b1c088a1c3cdd5919f9f946bc2ab94878c45e6c90b78bd47ac7db66463d2425fa5f458b9a7df88ccfeba8d55d3b45ef5b9c2a6d4e132d76b69b4a324341ca2dbcb7114f04ebf8eba1c84e59ce187cceccf2837456aab231e9ee2d4128b077aa8ff52fc6fa24be784e14cb7debd9fc07ea16bf1b07048def0c36ba30431b0874429a8b5f67dc56e9200383b0d1ab11d6ade", 0xd0}, {&(0x7f0000000540)="5ff376b4414099e5d010ecb74be6d9ca11d7fdaebe8b391d50b1a5aa9ad80fef665f305e1194c70c03a73a2317a3e3e6e1a8cf7c9d4167662328973b41e17ba6aa956052f014c70550f9beec5cfb84e669117362aac0c36d6acd8d4334ddec4598a3916b0a6c0479894936148162ce47bdd536945ff00f153e315e7ba79b4f4107535819dff54b9465712aa0414451a21baff1ddb7f446cc4a9e78d8dadf5491dc84b7955c7fdd26bbee9cd90157746798fc", 0xb2}, {&(0x7f0000000600)="2d78aba42a655356652a74829d8d34675d1ae5146dad27e2f4cc35064af1199c27078c2fc45597de070c6497bc63c8146286af62fada455a709e882903f1f3e0a2ee82c6db7b15914d4d5b074deca6c8159913b8e386796dad02b9fedbbd83e97752316393a5e3019324bb", 0x6b}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="1075aaebd176f5f13c8cff1018d10a534c9d4382737cbee893b609f3180c61d50bd7569467f813a948b85aea77e27f3b9b988da7efe0d0a57bb20b53be41889dba94104ad3f7d2fef6b5d07ea9de13b6d65ac83c6b42f88b9c45ee39c91bc448800409754fa0fa0313a08d0970d6bfbbe145f2bc194917531e0a2e1a672dff0d67c583a8a07fc9b25e253605166d6a9dcd873399c6eea21459936a07b4d4ddf6a73e5a14b59cd389741daa440273c59719c39048f655a08efa6f1bf14f6cc0152fa040c9784194db9bc681783066f64b0e1271712b20267bd7f32e0f2f3301ebb444f9e84f145bafe7d91cc2e654d148bb41bf6401d04c2ff558164fd0fa38", 0xff}, {&(0x7f0000002780)="0c7ce4d2b1a761d8013597062d784145c3879e030974d5e766f00a547ff865c8f80eba9b40ac3570e06f96421e4b81b6d5293f7675ecc930c6796c24c97abdf840b5a826c75410bd41bbcb819ad3d4206c5c7809", 0x54}], 0x100000000000031a, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x500, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x88, 0x64, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700000000009f663895000000", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r10, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) 12:46:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="800000003804000019000300e60100006c0000000000000001000000010000000040000000400000801f51c02a0932e5735ebe5a00f4feff53ef4ee46cc802dc5d51198ee5f6f61523e6b216a7", 0x4d, 0x400}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80, 0x20) 12:46:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1c2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 460.075116] EXT4-fs (loop5): invalid first ino: 0 12:46:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:00 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 460.163746] EXT4-fs (loop5): invalid first ino: 0 12:46:00 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) unshare(0x40000000) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) epoll_create(0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x100000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x10000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000140)=0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 12:46:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000058) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000001c0)={0x6, 0x1ff}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x4182) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000f8ffffffffffffff00000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000380)="97b6cbb08268d1377da4cfb50e54ef7d12e6f26686929f23792e93826787d0ce6f3ee7a558159dc202345040caef7e4571f49400008e841a0f161b8a778deaad86f026217c91f09b61677ebd03b47fe96f42801d7cbff6ccb6fb594a5ae814720c1be55ad6864ff590621e1bf613b3953ff156589f201af71356f0a7a1c08d0fff44c4e18b5f5f48c6bcbe04db12805676a9c80c3938abbee6f21e603dc3ee7bc080c8a875fbdcc61ecd0476b67313f39d5c3f9449b2dfc48ae5cf56f3b1e2601546b0031776ba095464f6f420f978b34213114123baf928d81170bd", 0xdc, 0x8004, &(0x7f00000000c0)={0xa, 0x4e20, 0x7, @empty, 0x5}, 0x1c) 12:46:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:00 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x802, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000400290200020000002000000000000000000000000004000000000000008107002e2f66696c384d540af3cd93dcfec4dd43375d0a82653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e0000000000000008075fc1a815002e2f66696c653000020000000600000000000000030066696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c653000020200000700"/191], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:00 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000380)) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e20dde5acd84483de2cf8cb7a4e1cb32b3b4d9309db"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x7, 0x6, 0x1f, 0x0, 0x1000000000000000, 0xc34db6f6101ea925, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x1084, 0x8000000000b5c7, 0x80000000, 0x0, 0x4, 0xb0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9e, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x3}) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r12}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r4, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r12}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000024}, 0x5309f5a918497046) 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8e0}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0xffffff81}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290000020000000000000000041d0000000000000000000000000000810700881c66696c65308200000000020000000000000000000000400000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffff0200ff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 461.061127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8665 comm=syz-executor.5 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) truncate(&(0x7f00000000c0)='./file0/file0\x00', 0x6) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x102}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x24e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000440)=[{&(0x7f0000000380)="6a56de90a62f88a1ef3e77dcd248cadaa3261f526642b0fe0013a980a943e3fbe9dbd70724ca2a62617bd0c9effcfada9412b97eba368414dd38ffa0fad7ffcb30e1bb1e8c42ec5ec05aa17be8db3f62c3fad8f2fb645eeacf2976d1bf5417cd7c3606d6341c3c74d9013ca66e301cd2a50534cc17ee38af7bf118a763c89eecdbf3", 0xffffffffffffffc7}, {&(0x7f00000001c0)="558b91b5f269334b5cde35d3eecb0a3255248a2b8ed262b5"}, {&(0x7f0000000300)="5817de418b6556a5de727f46e6d99dbb2137ac87a56318a5dd1e6e"}, {&(0x7f0000000540)="2bdfe95aeae63bfae74009412571a3c9a455c01e24c954de12f9a1950f0c27d2c95dcc932f8e2ecd22c6fbe12505861e86c5537ee713edd3335e18569cd9d07c4a6b3a716aa9a1224d08c418e82da79949bfe455d3a477d86ed7950c9a0b9e1c1c7caddfd163a78df6f22deaf6a634400a4fcf8ac9ce6fd1d88233c7d41a43a17f40872fc13029e586e3b15ff8d1fec8b093509fb3a41390850905f4deef8173b1f17ff2810df8c357764cd2366b9ab2ffd392edc0162f10aa1310b6657b813a901281"}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000640)={0x3, 0x29, 0x2, {0x2, [{{0x20}, 0x10004, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0xe05ecf0fa2152e5c, './file0'}, {{0x1, 0x2, 0x7}, 0xffffffffffffff0c, 0xc5, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xfffffffffffffee5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)=0x0) sched_getscheduler(r4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x202000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 12:46:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x4, 0x70, 0x1, 0x5, 0x15, 0xfc, 0x0, 0x6, 0x40000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x80, 0x400}, 0x10, 0x0, 0x8000, 0x8, 0x4, 0x4, 0xffff}) write$smack_current(r0, &(0x7f00000000c0)='/dev/ashmem\x00', 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x0, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:01 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf00000029000002000000eb00000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x0, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:02 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000240)=@get={0x1, &(0x7f00000001c0), 0x100}) perf_event_open(&(0x7f0000000140)={0x2, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) pipe(0x0) syz_open_pts(0xffffffffffffffff, 0x141900) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x36a) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x44045}, 0x804) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20040000) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 12:46:02 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r6, r7) fchown(r4, 0x0, r7) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r8, 0x0, 0x0, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r10, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r8, 0x401845e0, 0x0) write$P9_RREADDIR(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000010000020000002000000000000000000000000004020000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000002000807002e2f66694c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c5f30000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r11, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x0, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) rt_sigpending(&(0x7f00000000c0), 0x8) r4 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x80000) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:02 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000003c0)={@local, @initdev, 0x0}, &(0x7f0000000400)=0xc) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f0000000540)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@loopback, @in6=@ipv4={[], [], @empty}, 0x4e21, 0x5, 0x4e22, 0x4, 0x2, 0x120, 0x40, 0x6c, r2, r3}, {0x7, 0x2, 0x7f, 0x2, 0x6, 0xe2d, 0xffffffff, 0x6}, {0x51d, 0x8, 0x5, 0x8}, 0x40, 0x6e6bc0, 0x2, 0x1, 0x0, 0x1}, {{@in=@broadcast, 0x4d6, 0x2b}, 0x1, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3501, 0x4, 0x1, 0x6, 0x100, 0x4000, 0x7}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xa2, 0x8001}}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = syz_open_dev$loop(0x0, 0x0, 0x4182) r8 = memfd_create(0x0, 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r8, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r9 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r9, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:02 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:02 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000001c0)=0xffffffff, 0x4) fcntl$setflags(r3, 0x2, 0x2) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r4, &(0x7f0000000380)={'system_u:object_r:modules_conf_t:s0', 0x20, 'system_u:object_r:ld_so_cache_t:s0', 0x20, 0x4, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x81) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r7 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r5, 0x401845e0, 0x0) write$P9_RREADDIR(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) openat$cgroup_int(r3, &(0x7f00000001c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) sendfile(r9, r9, 0x0, 0x24000058) fsync(r9) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r6, r7) fchown(r4, 0x0, r7) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r8, 0x0, 0x0, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r10, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r8, 0x401845e0, 0x0) write$P9_RREADDIR(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000010000020000002000000000000000000000000004020000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000002000807002e2f66694c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c5f30000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r11, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x1) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="00c6dccbf2786c249186131380f3a845f3e028fd365d8bb1040c01f1743db40e4ac764b9cf4cf6e03efc79cc09a9ebce2385c3132f1e4169d356c73dcf4b33417950d257477c4a22f6ed61ca74c929055f5a0f2eff4d9c270af6"], 0x5a) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x801, 0x0) 12:46:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000180)=0x1, 0x137) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup3(r2, r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0xe, 0x3b, 0xf, 0x11, 0xa, 0x8001, 0x2, 0x122}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x0, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='attr/fscreate\x00') r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) mlockall(0x4) getsockname$packet(r4, 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f00000001c0), &(0x7f0000000300)=0x4) ioctl$KDENABIO(r3, 0x4b36) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = eventfd2(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b800000019000100050000005b000000ff010000000000000000000000000001206caf3096497afc788ecce0000001000000cd33b8d0000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32, @ANYPTR=&(0x7f0000000100)=ANY=[]], 0x4}}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000180)={0xfe000000, {{0xa, 0x4e23, 0x8001, @remote, 0x4}}}, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x0, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x9, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 12:46:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x1) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000000c0)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x4182) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000300)=0x54) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000540)={0x1b0, r6, 0x20, 0x0, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ef4aff1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x27a, @empty, 0x2373}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x42d8, @local, 0x4}}}}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x4000000}, 0x2) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x68, r6, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x17}]}]}, 0x68}, 0x1, 0x0, 0x0, 0xabccfb4969d639dd}, 0x4000000) r7 = memfd_create(&(0x7f0000000540)='.^\xe4\xa7\xbb\xc9\x9cI\\\xf0B\xc8\x06\xb0\rF\x9a\x9d\x1dP\xc8\xce\x03\x83wqf]\xbab\xc1b\xd8\xd3Bx\f\x9b\xc0\x01\xbe-\x12-Z\xa7\xfc\xc4\\$\x9b.\xc9\xe0WQ\xa0o\xaa>\n\x1el\x1d\xfc\x032C\xe56\x94M\xda.8\x14sG\xc8\xf8^DT\xb1\x90[\x9a\xead\x113Irr+\xae\x1d\xb1P\x93F\x9b\x9aU\xa5\x7f\xefQ-\x9a\x18\xa2\xf3\xb55!\x98j\x88QX\xd0RbLT\x16\x06\x8dD\xb7\f\xe6\xbc\xafc^\xaa\xbe\xb6\xd9T\xf5\x04\xb1h\xdc{\xf0\xbeK\xaf\xe7\xbd\xcb\n\x1b\x12\x8fT\xfbj\x95>p\x82\x92\xcaVz\xa1\xba\'\xda\xec\r\xb6\xae\x8e\x9c\x9bp\xc2\xf0M`\x01\n\xf4/\xe5nY\xc4\xfd\x8b\xe3C\xe7\xe7\x93\x1e$zyw\xb3-\xe4\x1d\xde\xc1\xad\xe2D\x9c5c\xf9\x058\x9e\xf4\xff\xa1\xc9W\xb8\xa1\xa6h}\xf5\x1c\x03\x98)\xb4\xf7\x87-4\x87\xcb\xfd\xd5\'\x91\xab\xa4\xb1Fl\xae\b\xc0W\xf6\x89\xd7\xbf\x90\xc1\xd8\x05\x14-\xcf*@\xabW,e\x9b\xb0\xf9\xbb\xdb\xea^\x1c\xba\xa2\x81\xe8\x93?\xd4\xd3{@SW\xcb\xcb!|\xbf\xe858\x8d\xf2\xc3\xde\x1a\xda\xbd0b\\\x9e\xc2\xd1\xcf\xc5\x8ef\xbfL}\xb7&d\xd9}\x84/1\x00'/341, 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x80000000) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4, 0x7}) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x6) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000780)={'syz1\x00', {0x0, 0x749, 0x0, 0x9}, 0x23, [0x0, 0x0, 0xe29, 0x8442, 0x3ff, 0x80000001, 0x1, 0x0, 0x0, 0x167, 0x0, 0xd8, 0x7ff, 0x80, 0x0, 0x0, 0x3f, 0x7, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd2, 0x0, 0x7b70, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x7e9e, 0x8000, 0xce8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fe, 0x0, 0x6, 0x3f, 0x6, 0x0, 0x7, 0x2005], [0x0, 0x6, 0x5, 0x0, 0x0, 0x7, 0xa000000, 0x57b4, 0x0, 0x0, 0x2, 0x0, 0x4, 0x401, 0x0, 0x0, 0x81000001, 0x81, 0x80, 0x0, 0xe00, 0x1, 0xe0000000, 0x40, 0x3, 0x0, 0x0, 0x5, 0x0, 0x8000, 0x6, 0x3, 0x0, 0x10001000, 0x0, 0x52d9, 0x3, 0x0, 0x4, 0x7, 0x48f, 0x0, 0x40, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x8, 0x0, 0x6, 0x0, 0x3, 0x9, 0xccf, 0xffffffff, 0x3, 0x1, 0x0, 0x0, 0x0, 0x6], [0x1, 0x80000001, 0x8, 0x7, 0x1ff, 0x0, 0x6, 0x0, 0x518, 0x4, 0x8f4, 0x400000, 0x9, 0x5, 0x945, 0x1f, 0x8101, 0x0, 0xd01, 0x0, 0x0, 0x1d6f, 0x0, 0x200, 0x6, 0x1ff, 0x2, 0x0, 0x0, 0x1ff, 0x5, 0x98f, 0x7, 0x0, 0x1000, 0x7f, 0x800, 0x101, 0x5, 0xff, 0x0, 0xfffffe84, 0x8, 0x1f, 0x0, 0x8002, 0xa4, 0xe33, 0x839, 0xfffffff7, 0x6, 0x6, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x5, 0x0, 0x8, 0x2], [0x2, 0x6, 0xd6e3, 0xd0, 0x3, 0x101, 0x10001, 0x0, 0x8, 0x4, 0x0, 0x3, 0x3, 0x5, 0x6, 0x0, 0x0, 0x800, 0x7c8, 0x2021e7d2, 0x0, 0x1f, 0x0, 0x0, 0x1667, 0x6, 0xffff, 0x7fffffff, 0x4, 0x7, 0x0, 0xde54, 0x0, 0x3, 0x1, 0x1f, 0x1ff, 0x3, 0x0, 0x2, 0x0, 0x7, 0x2, 0x0, 0x6, 0x0, 0x5, 0x0, 0x296, 0x1ff, 0x1, 0x3, 0x9, 0x4, 0x4, 0x0, 0x7, 0x8, 0x8, 0x4, 0x1, 0x2, 0x8, 0x12]}, 0x45c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={0x0}, 0x200, 0x8, 0x0, 0x0, 0xfffffffffffffffe}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x8, 0x758bb90b48094914}, 0xc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x210042, 0xa5) sendfile(r1, r5, &(0x7f0000000140)=0xfffffffffffffffa, 0x6) io_submit(r4, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x0, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) [ 463.561161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8993 comm=syz-executor.4 12:46:03 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:03 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:03 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f00000000c0)=""/37) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)="c31500006e7be58f2e3c248da7a52f01002affc91d3f6de487803bfeea0816af57541939cae690f82018e8c3de1378ec4edb722d73e37b0b6a2c137c01e9fa05803cec905bf7b43a4ce471", 0x4b}], 0x1, 0xbf2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x20, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 463.695274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8993 comm=syz-executor.4 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffc00, 0x9}, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f660e244ce130ed8d28ae0608e672696c65300002000000060000000000000003000000000200000107002e2f66696c6530010300000007000000000000000cffffffffffffff0200000007000000000000"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x800, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="bf00000029000002000000000000000004004bb4993a961ffed731d7dfdf00000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c6530000200"/197], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) r4 = socket(0x4, 0x0, 0x3) r5 = getuid() sendmsg$nl_netfilter(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x811}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x444, 0x10, 0x5, 0x20, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x2}, [@generic="a5d455a34a2b2ddfdc2eeeed242b8d2a68a830fc260c4d5ee96d1415f32e4e7c31bfa5698d7ba304e251063fad4b8c66410e6460f696c2268e4914ab7ae4ba79f2618397072871ea90cc7f614e07afc346353527f90048f0a73b6d90a070f2c9300d8f13046bfe6bb67efb085b5131cc2d631fbc2e0fbd1087890bf62d45f32296cdd6c6bab3ae84672461ffbc9e059de7676feda33a3639b74f1e4dbde5ecc57fd5e3d4e0ef14b33dbabd4ea47606b1878e79f3898b0023401ede0cb81c07c4fbcb4e9d1d729f2d0d40c1ccd7b526d5dd8fe553eb68ff1f", @generic="64b37798ec6b7d12ddf8a3289c8a56e25592e1653a99edfb0a4920a1515dfddc2cfbac5ee5eb359e6f9e6ba107715fc34f70c28fb25b884b4a8d740ee35621c862be0c0f8f5f606e71aa65f6bfd8575b6582dca34dde03ab3b094991b2aaf22d8534d81adec96aac10079d29fa330a0b6717558f16de5d235e2b03d4a1950b657f66c0eff4c0", @generic="4327d5643cd9cd9d3b6385577b9f8875a233a823f85d232a5cd77c31964ba38da0b590f90e719121a6859a0d5c61b367bedbcc97474637daec0b7a77ca5b4bebf90d664ab5b93818533d22d856dbcd980e2cd3865f04ef57ecb7dcfed1003aaf846d92fa6c60c34187ff50b49e62d1896d868a4a8689b8364a1a1c865eb3d1eaa5cae41786193dd2184c4f78cc968b45d250", @nested={0x14, 0x31, [@generic="e8d70c4e97351df7e6728580fdc87c"]}, @generic="23370ebff032bcfdaf1fe22bca44061314ea796e2a5c849ca51935bf45a72d7ef4665b31e879a0fc7a0e116d1aa3876694da1ce72e96ff1921d1b96b2d85ef8c6e42774ae9ef0b26db64d62e35ea34016e8a58e2b1cf83f889abf3eb579df051bf9f9085bed251efc1cc8adfb717210915f046388a75fe9dd176e93dbd40faab992462dc1f42231d0c0660fe8c6edff9ba8f2fc55c63c7a785e19ccec0ad008244eb42fe0e852349d889450753e5e6eed1030d978a055b0c4aa81e830962f1bc69be417d", @nested={0x168, 0x6f, [@typed={0xc, 0x0, @u64=0x1}, @typed={0x2c, 0x94, @binary="dc039b66a466fbb70512ce4eaf6a6c35e7041b7878d7d289b3df15f088dc60984fba753cd5"}, @typed={0x8, 0xa, @uid=r5}, @generic="45b8095a2959ff7cea99d169e2e8501cb2212bc3ba0a76988ef8bb3f5bf58f5b734b07089f91b0b57c6d442b722c15ce2f9e5763235f2bd9e47fbb48b25a969df4898abd357e8ee3983c38d398e6b695ba824ab80c62fc2595505e162db6729d6fd7bdbb", @typed={0xc, 0x2f, @u64=0x80}, @generic="364d5d0f294d8b35619576dde9923e24be64d15a68c8460e46d0908f154593c56bc0a63be753c1853c0f9d83f26e5b9104ac3190e82985682224501a55057f5d1f4f3a8c8c159afd7620887e4934dce76608b35239a6c2758050c7815f39b99a828b26b9549fbdba38dadd68a91b487898086e641f68cfc48965b2b1162b3760cd2a4927d6ff167a2bf33c602618480d672121c257e92ad2ee80cc17bd2b14ffc961011feaa7b4019c6b2aeec14fffddc7764d"]}]}, 0x444}, 0x1, 0x0, 0x0, 0x280500c4}, 0x1) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f00000001c0)={{0x3, 0x2, 0x80000000, 0x2, 0x5}, 0x0, 0x100, 0x87d}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc158bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531bfdfe5c", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r5, 0x0, 0x1f6, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r5, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000000540)}}, {{0x0, 0x0, &(0x7f0000000f80)}}, {{&(0x7f00000010c0)=@nl, 0x80, &(0x7f0000001580)}, 0x9}, {{&(0x7f0000001600)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)}}, {{0x0, 0x0, &(0x7f0000001dc0)}, 0x8000}], 0x5, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9881, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r6, 0x89f1, &(0x7f0000000080)={'r\x00', @ifru_ivalue=0x7}) syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 5: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x3b) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r3 = perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x81, 0x2, 0x1, 0x5, 0x0, 0x80, 0x40141, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x18000, 0xd3c26e12dd163f10, @perf_bp={&(0x7f00000000c0), 0xe6a8e03c5d06c931}, 0x2, 0xfffffffffffffff9, 0x3, 0x5, 0xdcf, 0x3, 0x9b81}, 0xffffffffffffffff, 0x6, r2, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r3, 0x1ccafd68) getsockname$packet(r1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, 0x0, 0x0) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000100)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 12:46:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) flistxattr(r0, &(0x7f0000000380)=""/141, 0x8d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cff00020000ffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r6, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r6, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$ASHMEM_GET_SIZE(r6, 0x7704, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:04 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r4 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x8) ioctl$TIOCSISO7816(r4, 0xc0285443, &(0x7f00000000c0)={0x80, 0x3, 0x118, 0x1, 0x4}) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x1, 0x1, 0x53, 0x0, 0xb45a, 0x14002, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x3, @perf_config_ext={0x8, 0x1ff}, 0x26060, 0xd8, 0x10001, 0x5, 0x5, 0x1ff, 0xff}, 0x0, 0x0, r5, 0x2) 12:46:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x0, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000280)='illinois\x00', 0x9) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) fsetxattr$security_selinux(r4, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:ipmi_device_t:s0\x00', 0x23, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000000000000fb01002e37ca6c0c4bfcb2c044bebabac3d05b1abefd3ca534d496403a1387f8106d7827ef1f53da51af6f04457663618f250c3d3ec1ed9fcc26ecfb8ba907a6701c22d26261df81c62ba1d4488bec1d2e483c90b91f19ce42a85c4ca04102a7cfc08b4b4b1f2b1a24640609779c54e8c4260cb95a4fe54320d056fba02ff64446997e73bee4726affdb704f8ca4a6f523522325563d0a38a6026f"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) getsockname$packet(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/90, &(0x7f00000000c0)=0x5a) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f00000017c0), 0x1b4, 0x500000000000000) 12:46:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x0, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008107002e2f66696c65308200000000020000000000000000000000000000000007002e2f66696c65300002000000000000000000000000dc5b00000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c6530010000000007000000000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x0, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fstat(r1, &(0x7f00000001c0)) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) timer_delete(0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, 0x0, 0x0) socket(0x100000000000011, 0x0, 0x81) r4 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) sendfile(r2, r4, 0x0, 0x800000000024) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000058) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x4, 0x3, 0x0, 0x0, 0x0, 0x3ff, 0x2001a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffeffffc, 0xe985d86e501cf667, @perf_config_ext={0x9, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x24000058) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 12:46:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x1ff}, 0x1000, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffdee}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000002c0)={0x2009, 0x8001, 0x8, 0x8, 0x5, 0x4}) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x3, 0x0, 0xf7c1aab40dbb30bd, 0x0, 0x0, 0x9d1}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000280)="ff29910063537d676d2575c60d871c7b49cdc9ccf1061d765854d51954ca63d0dfee3e85ac94ed16a063c7d82415b52015aa73132de4c9050f", 0x39}], 0x1, 0x81803) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000200)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="bf000000290000020000000000000000040000000000000000000000000000008102002e2f67696c35ead0b58c744b856efd4c653082000000000000000007002e2f66696c65300002000000000000000000000000000000000000000007002e2f66696c65300002000000060000000000000000000000000000000107002e2f66696c653001000000000700070000004087c8000000000cffffffffffffff0007002e2f66696c65300002000000000000000000000000000000000000000001002e0f4496bd9d4bdcaab0784cb21f2a16a53e3bdd1c49125d8e296277fb522b98982093a72b501930791b4387976363752eb78802226a6bbaa365e5b6c1bbb9ec44e10db030597d46082b1533801feb94fc46948de60f3ab9e34c4043b9a48bb81bbfa80abeec74e1d00effaeb89e33cd14008ab0c2f156b55ffe62e400ff2f650a182b07294fb6e1daff61e84d86214ba90b3cbbb34446194f65f5caffad4611125427"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0xaaaabcf, &(0x7f0000000080)=[{0x0, 0x0, 0x5}]) io_setup(0x3c1b, &(0x7f00000001c0)=0x0) io_destroy(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r7, r8) setfsuid(r7) 12:46:05 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000380)=@ethtool_dump={0x3f, 0x1, 0x6, 0xa1, "9b02148f4af9938672d82a2c7d2586ee98c878a3c5e04cd17b25ce03ac3ab5edbad41505a722c966d370b88a409028e5d183df877045f6ba1a0fa1363722bbca81fd3b6e5ef91bd27c9d586353699d9d0fc5b9df7b32ba801d92af0816fefc902a48dcfbd6a7473c6dc781ab015fdf5ed3d4dd07af97b8cccb0f47281e36ecae033c463a0ee0079523ec42845af3783d8a0154e20529e148428c7f39f6d17172d8"}}) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 5: prctl$PR_SET_FP_MODE(0x2d, 0x1) 12:46:05 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 5: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr, 0x1}, 0xfc7a) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="73797a31a21e58b23404000000e57877ec7ce76e9b0d369849c847f7dcf81bdc98ec01b6ecc5bc3f90020096b6314656fbfc140bd39b4387876c1c503b0d4299e3746bd4bfd01db867aba87da9c207313adc54723b112deeca7a850bd144"], 0x39) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) connect$inet(0xffffffffffffffff, 0x0, 0x5b) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @remote}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @broadcast}, 0x100000100, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x200000, 0xfffffffffffffffc}) accept$inet(r2, &(0x7f0000000200), &(0x7f0000000240)=0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14, 0x40000) getsockopt$bt_hci(r4, 0x0, 0x2, &(0x7f00000007c0)=""/250, &(0x7f00000008c0)=0xfa) ioctl$KDDELIO(r2, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x80000001) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="700000807d0200000069412d1ccad951fbff016c50fa87a085adde26545f00010003000000040400000004000000a5a104fc00000700000000f7ffffffff0000002d560000001f0076626f786e656baf546019a1286b657972696e67656d312c08006b657972696e670008773f0286b347020941c4326873c9282615e8ee9a971230dbb5ed9df9f8ec21027c9ba420f85300000000000000"], 0x70) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2f}, {0x0, 0x4, 0xffffffff80000001, 0x0, 0x0, 0x7ff}, {}, 0x0, 0x0, 0x4}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@rand_addr="1f000000008ef6e1ff1200fb7491e700", 0x0, 0x1}}, 0xe8) 12:46:05 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r6 = openat$cgroup_type(r5, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000380)={0x6, 0x2, 0x4, 0x0, 0x0, [{r4, 0x0, 0x4}, {r6, 0x0, 0x4}, {r0, 0x0, 0x8}, {r7}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r8, 0x0, 0x0, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r10 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r9, 0x4c00, r10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r10, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r8, 0x401845e0, 0x0) write$P9_RREADDIR(r8, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r11, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) write$UHID_INPUT(r0, &(0x7f0000000540)={0x8, "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", 0x1000}, 0x1006) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)={0xc5, 0x29, 0x100, {0x2, [{{0x80, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0xffffffffffffffff, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x1}, 0x0, 0x0, 0x7, './file0'}]}}, 0xc5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) sendmsg(r4, &(0x7f0000000a00)={&(0x7f0000000440)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)="1a5e11785eb0d23951138688adf02b43e514b5db3142867b24097b0ef8616d9a827baecc994647e136784bd6b14a7bcfb51f405785ebabced68aeb1f5a454874510227fecbed89c840e11203b7f74a5bc8f8c1e0e988aa7287422b2cb2f9abc0a422e7c432511f5935b413e6086245061e3cbfc9cedde3302c0a1aaab6b72e80c913e847c79892ac3424366ffa1e7d", 0x8f}, {&(0x7f0000000580)="679bbbd5478688673024f50add0b4a1970fda82ce27cce4192e0905e31b5a6b5f0f1b19505e1399ea6251e821318628396f672f3da8d2e1004dbc8812fd6b0f074a9099bd9ee81a27f43b7456234b93d8eabc19f3eec1438041e848ca666c3cd0e429457ac8abbd34b1cfd2cbdcf9f6086232f989a918791dd760c068bf6612cae2fa7373411ae0aed5c9818ce93d6a3af6ac069c4a1037f619355bdc97f317d", 0xa0}, {&(0x7f0000000640)="590e233bca9a470675478f1ee12c23e3987075acfbf629269ffd05cac417fbb442a2233ceeef7c4759348ba48710450b52134adb93fed5082fbc8d5ef758bdd3ecff41d57e78c54a5e0ca84695fa6c73ba12a6adfa3f9f012d6de2bac958f4548f4246e8d7e5ff90b4c354c8f5dbd22e91b96c1f8de54a2bba511937b14dd913216fc6e2c92cc7bb82257f55a7bec806f05dfc008447d8f9ad004401360c5e6a0c8737d5ffe1021aa892719830ce22d6878110b662e69e37e6c76250a42b702c32880c29e8cecc", 0xc7}, {&(0x7f0000000740)="cea27ac957dff9e69b057731e6a2e3ba312f54178d5d8d457d1c6e5abc748a93b65ccaa69561b5dcc395d30e75d4bdd31bc29dcf0aba7dcf9f338e1532a0cdc9b4b9917a97021427642f73803e4e63fe85941a8c538acb3f7857ed31b99ab12e1764db3c75ac877cf437c2769c6d729d1a9f", 0x72}, {&(0x7f00000007c0)="8892cd385457a1f63775c93f090dc3f1041bce35ba2154290fc62dc2c787ec80571e89e930981a99e44aa1bfe5e2c723e1de588228fadb9cf6da108c4c8ad5c55bd8", 0x42}, {&(0x7f0000000840)="4ab99843d77bf63c1f767f2b327aa47bf6b03429008943bb15708da6e92189061b2efd90272dc958ea7ed4f6fdb9bb5c0b6fdc2197924d1200cb8af71e0d0a77e686dca814f1117bc1a1d39c0eae574dbcc85f2b428a1983926b7aede4da1f39ac9c4f68b6fb1cb5c64a8981371a748d204a233da46043a7d074af303aa35e651416c6ba36f18d58504990aaf96ae4d837ad9abe46348c81c8d30eefaf9ee2377b907e6a0c329de51b3dbceb255cc7", 0xaf}, {&(0x7f0000000900)="3dbf26a79044120ae4ace1992afe251e0fb53c0574be4fc422ac4c34d1b8b5ebf7b300f5fabca0f78b4a123f090054685b9e57554ba3f4aad018c89435e527c24038e2506c84fcde7c6584029570187622f62b65b5135dd0e1176e22dfd4ad20c2c700", 0x63}], 0x7}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r7 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0)="0896ff7d17b6b817f6e19257c401ad50f69e3fcb596407004838d0eafcf0c17c110048c234c454459e46c8c92342dd412716c1f2900810d33703e32f5e178b6b70d07657e47dfdc2a8b3409957778ee89ecd500fd562ae979fab5d8607da72793ae504c08fa8be62a49cac75172a2638378ce8a09c19ef9344733d7f9480ba68a4f9664a18ff9307794f260df5af9fa448515d816e2c413f89794577b81a3cc53897bb2f74eefdfa1058bdf0c631de7dbfd1b1afed876a50b744dcb1586248afdc9fb2a9a758e905bb81ccb8b683dfafdf2dccaf47c75266cfe70a41f6e522ca0246292df719cbc3acf6d4d67f07a51c052a1102edb8c8f75d1a8d04b1202f20e32bfa88e50321eb2d67864d6ecce3a5429df580a71abbbc795c7fdf6f956a5d975f585ce18fcb475383265eb0b322154670a5218465949a34f4f9b577a7670a31754ba1c05bd8da83aa94c40aff8c1824d104e2863d70c20540ff0da3f78958763d00022589d488394a0537c82d70f631a8220538f103707b9990deb384cd32581b08fd02f775c6861d18adbf44c34fed73200159fe593bdf1ca8e77eeabcf1d369e78a5b44131e88f80941e27d3779181560030ce482e87c4650b2b731157a1118e9ed7a24645fbb4330cd8753dd39ccae7b937696f76e9bd21ae3cd46e0705f41305ecba994fd85050862edca5a87c40e1a09491ece2abdcf541174d6f2f41415b213f8a8f0fe4a73e37ad0f29671f0695e1dea1e3717a7ce5bd1f0eca63de1967c3789ad100c35bf4c21679f531ed7707b6f8c2ff908410df97544eaf97f280e83a45d3a07cbf0da7e04387f8166cef3ae52a2180fffe0a32b6c27761a95af244f1c983f5566a39897c40e51477ff7b60859662d8a1dc00935022889a982f67a6b57ca8c37a2b64363b32090c5f449190e980513caacca694c77c44ab0332064cb047f57c102ef1fb5ff5f0dd25abe2478bdec0adbb2cae67f101c54f7725f1dd5f0acca46278429bc68dcdd6a4d06f9b9850669b7a9d3f9c2c44e42bb813232f89392099d70bdc1df0f926ceb29c1bdc29e8b0ce91d77ca7dc07d2a8f931e803d8ef84719df837bc01a425354b2c5c6c4a09a63f8a74226253bdc19a17211a2120675d323f39874861255d09c866bae46c4fedc13e0f43f0143068a695664009d728957f3a5fe15e3797cea06feaa3911705c253165e67ddf302567a06592c97b9456c3033c6666f199390a1b5d32a5a4f73654fccec32377075a79afdede4f12eae83175dda0e767e5b54a9feff29b9befbc5e276c96aff9da5b889af66a94bacef4deed4d575e2e57765163d40525465142ef19c742ee2c59f7e8654898be269e46c19214fdcf1e473e8c4b291b81220ee2af3ac2c1140870eca910c2690ff7bb7c7c303dc6eba681091192a9f553345292ec457d8d66a95ef94e5dbf92a8471ee39f2b7216810c5f3eb5a3a8a97f834a737b2f9626d32d774c58cd65caafb33fc4ffc3b3eb72f4ac8fba526d218c36889c6d41bec5b25753593640fbc79b0d126d93d998e6fca2ef0d61112e647e0ae7915881b0755226584f6fde1b145d4c09184d237bd8c9f7af22bcd990cef1e665b28ddbab0ac238e186df48fcf3afdc2ea54761318d1045dfa6ae97864e59bf9f19e239b6eb9a5cacd0afcac7fe7540f829c42a174615b4325adcef69e919e75ce703ddcdf182ca55cd91e713f85541df919756bd5fdab33baa3e675dfea1178ccbd0df531d33d246d1e80e41a386d9ec9b1951f00624c72800b19e59dc77a7fdce4728faa713636bccba45b20dc058b4aa53ee349c4366086bcca91ce30b653429be52f658959228b4352702c57e6f2f15b9a2b3c0e33b0955b6a5d35f8335baa97ca896adad3742ef4b3c85a01a20c9923adeff80a5c2e9c0445f01b98a3a981f57b1516363bd20199cf430aea20d022eab38042b356d69aba421a4e1d9fde76c10f566a2fd05d4c8c42fea33e1f75c39d581731f91d58db22266b3ab3a73db0ab92855718f534c691004fc86eccc49f60d8738cccf13d996d6ae75000fe59d1e5b2910952645d99afa42813265ad3d20ea404434e21c0360e8ee1ab99d4c78338d6519e1d7e10db5591c46ad118b00be40ae7f3a8518889170d701dd3e76964ac285e8a0fffe23b19ba708ed96469bdbbc958058d56ad9bc2f8e4bd854129aa3c31b3123c99c5df0d11541da09a9acf5bbd24fc676ddd0b5ff5e4284e78d51df507c64c7c85327b365790ee3563fb236d9ba6e82532e405481f432d8d56db2b5d8b76b652903bc371d03f1aa00a91d374bc9c8d270c2fbd5bd449daf32ed807d5e415ed858acb9c17809eb549518c1e630c4e0d897aa948e1b325077696a93c97a94462677e52ec3f21e2e4fb84de16fe4520e52137e60ae7b3f697a90d45da278bdfd8bf227634875f2c2d34d18feeb41d602da8dd66895738b107319cb5fcbfb964a076cc4a2e3a8e5e2c996ccf1c095bef32927b788bc4de06ba06cb0a5e2f8f79a1a9731e9375b37d6761e37a05a75daccfd54325800a0059121d5f32d9fb98a8603222a376ba44387a01a33a331f9817a0bd605479b582e14e3f296757cd40ff08298bcaeb8c44101c85ed4286b314182888ff053d951bf55858a530dfa5fd36182e5befbfa993402f230891706a40c54aecb316f88e039e6fd1035d2db8941215d65987731fdbf0a1c1f61023a2012014113620270674c696f8a4fc23e8fc6718e10d999e0cba0d26b9732fdcea87a14ece860a67323f4d7b989516c382136b571103497fda2abee0b87930208da7de932f85cd2076a1ad39bd034850fe0a87900e0619f2dc55dbef16a7604354c6fb6dcddfa76c54a5b901d3d71d6abe8ea2f827d732199c04966586cb6a7b26a30c3692d71c8bfe5d138e55cbb55fb84856ff3432dcc53422237f7cf121417dffebe691f268a2059befc25ed93673197136352ede4baa1b89edb256ef255b52b5449759b204d1f90c51f403ff41febf119e18287b3a1ee8059adeccb262fca90df2c36ecbf7b2b89e50d5605cb2ddb22d5301d4b2922419d2214f0a6bc2a8daed907983a354e778f3f44f1aa714153b684d9c9953b1568ea762fc0ae3c869bf8fe48c5bd512e1bd4fd79a8d84ae8d58513e03df0a598c376159ed862a789b801e90925340b095442405a20f80810614a385541dfb21e4a11556e69b4921bb5d3c18010ab75f0ba5f15d4285bfe407fc992962dc20bbe68e378aa496a1ee1bbfdf63d4300dd229cd829c3f62cc9591f6f67bcb69091ba3db1a8a486fd5ba697d18660fcc9abc33fde529551c22edd10ae2a062b2dc20933063c8793f1df53fcef8a3c8a0975a00781243e48d613d54dadc56ee1a78457a957663b3d77df4e94c5be1636b4dfb342f3127b82dff8c6e85416e34f61242a1f6e1186278aa9fc275c9ce1072393c47a70b20507871b39ff9c9f5ca054e9ed12b89108a3c6d2dc7294380d69bae814662740fbba14bc37e56f59802d83b84bc74fd7f0aa31ef518ce2d9c1ac6f5f2d79fd5d12ae0d348313f923466ebeac3d06144c5d7a82fb4231734b7a69a4e12385977bc4f9b976d0ab7b445091e94555bb5a31806c5b59cce8f9de7e7f8d687fe15dba32349bd75602f1b2684d7798dbc447c7354b8a2fd2339d599ab41262992458854475ba836a873f4a87405d68d9889d9d44ffc8c664297f6406e325a387548e9659c505c88a3ce71f0db9fe2a0f6151e87cabff7dc63f7e702e9c536f443d7b904b98f9cddad21935b159648033f5642b094a94f310a5e7137f0275ec4483dd6b3773baf1da933ac0efceebdd347d194cd774f9dcd16454e615f8c0a2097ed7d8d24797e5bece8b76ba941c5cd795c0d52cc7e14386c7c59c906decffe3d5ad5c2df6755fca736112f70cd591a1cb9b124eb86b38c232ed01bb81a30c23cd46593e07ebc34ef8b64d150fa5b9490dfcc63b73353f12c9a9c40a0de2176029b9d3d958b7432e52fbda1c6e24252bf5f6fb9294db248f58ebfad89d5980ed1d05a2e72d549a901c6cf39b796731adab7ac7eff908d6383d49c05b32b54e22389e72c6a0fe08462ebc1691c8efe30c6bcd39e0c4e3e683873324620e9720c6e88b15dfa974589d36a63a27be2e0dacf6e6201649f39f64ac597a327a0527c01148f97dcb797103bfcfed3fadc57f1f4bc065fe29530eedca1e774af8438ce5b6a15894ae88ce2a7e29c2c8bc7d184b60e413164a26e679848ca1ac6f74d09ecba73c570bc0a72cdbdda8ebf191171e52e73384b79f7186271042191a9f990b117da119d5d4a4375fd149a1106b911fdc5e4efc04dac735e231c3b7d0f8ba20714df7804f2f6c2582222af28dc62edfaf01a97d0b4808d0102cbd868bce519e295309aa9fc85e37897c3269964996870269621c692996cc0468e75d3f5b8ab744263fc0a870d982b482995144770a097d6a1fde21f9caf1400c3a951e306ec56925ff6d7b9c3ae9753a9c71d9a772e50eafc06069d9468c3b8f40ef3a21c731057c2a96d1cc5d27a3f7e0ba90e3deb05daf8cf94692de9b8323d6d064514dd3ade1192a03f1de4bd5e92c31492252ee379f1e03942c4e0ea9ef585f1b2bc155c7f030ac0f1701b993b93dfb10f0a7c503f7b187ecffd14c13ee5dab60ddd69bfcbe1ea63fa97a05c1e7ff1105f8d417255d551613b2a5088c45e64161b37410f6b4319693ea9895c159eb57d42cd04fe14679bf6192b534eb1eb297df8daa038c0c2e9ff26a127c312323ca5b1c6f1d3a3ca1c115d88a90248a38b40da36c63cd5ba869082d778f82517ef702f9a598b30b61b2f5e882a22b788ca7335cd734c25144779565281ced1a29a9b9445c64bb65b893489f2b92d4701239ca5a9490eab196eeb4046a63f82e2aba576bcf73abcc6c249ea8059b706452136fde05174ecf752df74fd90c5799b49ec0485db8a0e6c2dd0eea75657ef94c3bc969e93a794c7ec777edca85b4e416178d29d8b83ce707799faf7bae120debb80038b0b90efd757d015e03901c002d0b71e0fc215b62bc48fa4e9744243832f85592de8bb87df2049ee2dd24324e0ea2be79fed5f40acb7bbd79631c2263055bcca4cb9cf71d9e858008be90119409a428f6acfcebbf90e63f64f13a8c743d3e69f528809bdc557795b910e9626e2c481f9fc248c21c58ac43cf635ac045084eefbd1917e6ab8bb0e1620e05c5566a1a6d613c87356ccf50c09e353949aaa0b4780be386b7c40f575ca7d7b50f07d9a98261e296fa4dcdff174bd16ecbe08b6916e2221399ea8c1494782ab91d0ab5978a79e883816dae9726c2401919922fd3cf2e0dc7dea0543d7948d3eba01b6b25e23c4ff8e93aace8a0be790514f5d45038555bdd34677dd846fdd61fa5f3c87c9bdfe80e689bf6bb0fdff987", 0xf04, 0x4004091, &(0x7f00000000c0)={0xa, 0x4e23, 0x8de, @loopback, 0xfffffffc}, 0x1c) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07007400"/72, 0x48, 0x1a0}]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000002180), 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x24000058) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, 0x0, 0x0) getsockname$packet(r9, 0x0, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, 0x0, 0x0) getsockname$packet(r10, 0x0, 0x0) r11 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r12 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r12, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r11, 0x4c00, r12) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, 0x0, 0x0) getsockname$packet(r13, 0x0, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, 0x0, 0x0) getsockname$packet(r14, 0x0, 0x0) write$UHID_CREATE2(r4, &(0x7f0000001540)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRESHEX=r5, @ANYRESDEC=r8], @ANYRESDEC, @ANYBLOB="8c42b4183c4725e10447070d11f85dc9d462427688c04248c964091604036fbbe83910e34c1908c9bccd55197c647afa31e44ea3dc82144618abfeb80321067d15760260d16e24293c21bca7a07c70f67caa1ffa9013e7bb6842ae80589fddc1e97c94e6c48e6eb4007497f5f544b0fc5942626b07dc4fe49c9ef1332eb138039b26496c3c8d290b35db35cb60d723e49de733630e616ee38a4c9429b3dd528680874db74d90170c765495271846951586c9948081c375acbf47912af31d0d12575d2a2215d6b5a9b30d4a3c61867e1c1ea5f4e252b22ef3784ac961aa9aa9989ddaeaa5", @ANYRESHEX=0x0, @ANYPTR64=&(0x7f00000021c0)=ANY=[@ANYBLOB="9469549ab445c9daa50d9fc6b55d2e3f33796ebb67fae03c4f65337a2fb692d88eca6b99363e0731ac50112713b002e264a799ddb2d19a33024306ef60dc8ee7c06bf4ac7e967cb29e3af240b120810a7c890d66a4069d6b163af5b9ce8fd68b61da5663cdd4e2157b39090a43144b6cb785e27338cb7170a2e239d8ef076e64682932a21dc99b869945c143f168198599a3ff", @ANYBLOB="fe258ae6da46384307cec570e99e87bad9f885cc46ff1510331591110ba2adca86ea25b3583d6dde19a80a5eefeab06c4a741dae291a6c47461e472844b863163ea3cbb343665a6cda5413436a6570012daf0eb810ff91050718b2fde5", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64=r9, @ANYPTR, @ANYRESOCT=r10, @ANYRESDEC], @ANYRESOCT=r0, @ANYRES64=r12, @ANYRES64, @ANYBLOB="d383cc198145feb350bc3e0597925f2da62f054503a74ccd51f2f967bf9a685342ccfc11a743b91854b452f820dbdc27364f593b8ac934079a8c0fdd3a3edf057677553db7afc87178503fae4069e96a6bb75b9175d53ab8f16a590e7390f05cbcb42e48a90d33be1ba9a224248ac583ebc9c8f2835d184b65ee8689f651a0217802a3fc14fbb0a9c127ad02b3cabdeb7ef1ed53dcde7c955451dbbe4d3eb55e5ccb383029aeab8ccc47f64351f55e3cf42a70c0a33aa260a64c34071a73430aaada7bd0318143a81ff9c8dec55388f0bc3bc26adb3723fbbf4d12cbc99e2c05866cefd58115456c963d8a3b8af7c0e299c01b80a7e2d33f984caee8476febab4022d48b96a7f614afab01c012cfcd8a48bb0b50e8b2533b891c8f23db29225225abda122a801f052ecf1ca96df29601673c5efc16830ff0578e1f63cba4f7cd2b78558fe1046abd1f04e4b7b0a22ee30ba1a16395a2275e6442e8f0765bf53e210b5100d7961e1fea7882f531429da80bf1be658d44aee7e44a524e6578e7d8df0539e2bee9bdf04152c84268d13accce92f4b6192e0ad6f514251708cf35323151ff7f88987f225b067477ce46278592ce102374adce52798fc9b6a99b2a1176af1441e118eedb85a2146e2134711e27e4e4806d1a329fd9e35c7d183b30cf272419e4f3cc90e6dcdfd98be364ce6cd690bfed15a11a237d9967c9c2dbbd3ed10381afd2107c8775aaa58774d538fd34d494d32dcdb1d01644a2d535c05da52390199e4e5a190bf0d4d49bc5042e69109b46e81c87fda345fe2522cbc30a9c42cad4f3286b3e66dffc023101f0054e2491b4cb4ab84c75a5690bc4687bf70266d7bb22a99456771aa3477f82d6899b6e275055a724647012e3df41909a96e075070365a9465d039c3643732a419f1e273941c4abf3f1587d502f028147d7b04324cfac66e1a0822735c36680f239a0ea8de37555c251718cb515e808bfa2e33ac116ba30a76be9fc1cb3ee416e1e16db3fa2989ffa6353ca0c2b0bc0c155ea20cbe0f97b1ec4f3c786e51047d626aec01477f6c37062e537b79d27c998c22b380ec0e89cc12de66a73ddb9bf2117b26941c325ea747122d3a9b1bffab7dfe2d8b0a5c6547075d0cade236829bdb11ae1e6fbf5d67255d859039f9d3af20ab5d50071c7fd61f394e0d03ab0198ca5a35c5e4a7bd6fbabd7b38de44aa1ec9b4570f81c4b7340cdfb21a6291e93360540bd7228a3d4fccfe094aac623a8a428ae4648397ad6c729923f2e8d4c34269bfd1dd30319e8b837b592bb9a0f17210fcb977cc823c816b0115c6208dfa4af2ae352e588654f8d3f05c40f2539c275315bac3b8dba0b73e23be90faa462ba667add4f827a4ffdf8f4f344e6a18662946fe1b142161815deaa4a6924e93dcfa8d247c1582f92885f5b907ed9eeedf7c0958ffc094008e4292bdebac2e6c6df01e55f9493235966a14a676342a8654e9338e627d83a53dd950f6c5e818d2f36bd607c6bd3013e087104fb3275b3ca3598cd83efbcaefc2665831b8328e8202085fe04694ed87681884712e489afd8cd7ca76a7de0e1c8b528220815814591fd9ead01a05cb49182411e340c47c5fdff1db29d0d71076feed08c0b469468c28d70d394a8c305602d46a6f91655158103ec2dec8f1c62b85261f16b194ed9bff1c6f335c4c4812db148b557a6726715b9cb191bb0d0731f9a5055aa90c8fa80f4b119f82fd9134de70e3f41fc8513be0c186dcb5d75dd0eb5ce32b8677c1945a06476e375dd8cc5472b567f5d595d0dab4aad1484cc2e8dbc8071cefca541ee0191df3e5e335e9c2e0b31f730095372b0fd45817100363dd015410c329226bf573ff0ecd0415229fa12d1b03f0f3d8944956f7d3a7b6ab31a47ad8d59837a312ca084dedb6f18d5f244b90e95559571bc43397ef077d894995ffefe40c01591ea38a33b86b03f891fd7556ca33180f10ffbbc280c0cb20ba8df4dbc1642ca51c900cbd0fcccce7e853c661c35307807f338ce339bc542eb7f6694b40cc156be4b5e21f3d126c9c2730fed2a496df8e879a62df2b7897bb52a810adfca386baa760dc6f04e3b1dc2ec8859a056f30374d38f957e8bc7767fb08032223ac1585617bbfa4b0b9f14589221275e72186d8b66ad2dfebff80a1e2058412c9fdb53a7f0598fdb6d0b112761bcecc2c150416941175ca2e739d415ca41c9c2f1e46c1dd92bda9513fb402426c51885f2d4288943b721b23ee66977f8a46d3ad5284d0d2216dd20c55a1de31265e81c5738717201b23080d81b680cff2e2373d18c2c6483a192de0213c14f45d3c75230e9356435132ecb13b1041d2e2f33a3fe2060c7be606827fb0d3aba7cadca8021da0d0ffa9684ab8d9bc8e4d41857f9452d60988de13d2772644bd473c679794dac9a243af030000002ff8efaa517f2bb8effe67726b7de5f6c2afe0638b5071780265ab838aad47155aafca37883a034bfc590e5b7144e419127a3b66779488740525c4245a879576e5766ca939c40ad4bc86f5259d2f2c33115bb56e5bfe79f06f11d63197530bbe02aab87b7677d9bbbe1462a5b1f7c7c0a77cb140993b6580592783646f7281ae109f5f2598d80020c29d8fdcaaa978fcbbba0a35f23ba943225f857df3b61ecf3d7ca738434e4c199267313d0e09eb426a796083125537d34fedd61c93313de4851915486eff9f457a88ca4360fff1c75eb0e2fffdf62b32ba9a55d1ddda29365c055021a2b2413ac0b39a07f75600a9661bb399d26fd4eda9f2cdbc7603d9f5b08d52462b4ca49634e846cde2e5f40144c1f564001bb343c800fe2335eb3db0177c3dd43f4db59d1e1ff5b840997a13fc430391984c8d0acb7b8c9b3eaa003847ca70a4b2b8619de0e9dba643979a02130ca76a7bdd5ae96244205805c9a8c3ef6404c61c57a200aa1672b2a19b37bc9b31723e157be70af30b4c5cfd99b43f27a384b463bce87b05bba343081f2c72f499c2719b80f987f9780861bc95a9f99d9ec08e47bb395f7da2651d7aa986cfe2b3987505706351302779a6073d7c8883c71e7d2041747e942d8093c6e470f1e6c78667d0ce2de2ce0ec33c5e83ee575edd3b29d2ab48b0028cbcc3a4ea2fca158d2bafa36826c851e0cebe0f04d7b729360d95d00f8797b4f22ce7e957251509a4eb8fbc4f5b37ec773a78ba9320054316a3e99f40fdb94f43e605a5b59c105cbe471a7d426b556d1dc95e02f87336a2498489102c9e6413545aa06eb6d144f58f06d73c46922a402398082f41e2cafa03b6f9eaa7964ae7cab68cd5ebc06a72cfc890178dd0a565569afc5fe8b0916c6568fb7818c6e3630266bea0e1b2c6b9630afc49eb31eda1c9dffdcb9e9611e96142fb35a554b60def9ea690e8c8bb55530d1b8cc1aba87053d3fd71856889799a2f0eecdf2c216592cd2b9ecffd24053507b8b985c1cda51892f0064792809146ed1e3fd1eff0805eea6ee6d780aa1269132d647cee6b0f8709af79c2ba6d47bdc66ffdf082b930821eddc7fa4741318ab91feb08e2d6858a0fc018263baa2f1fec5a8f5c95d5bfb7ba9a78ac5b7fb62615a1e0ca72b854a514c4dfceebf815acdfe9ccbe7c2c080825c0b403a2da5155e356f8e51a4856e110d0a348ab82d248d63223e1dcc71386f07bed2442278bf067b7159eeb5e4ae5eeeb77139bd7e6b0a307decc2aeec45b0edb96d9fcacd46ff701470623915fef9ea469a11afa912908bdb4aa8911d77c6f229465a0a91d91ccbed9908eb7fa2e48a46f38abb71f591929732fc156bfe2067598a84203baecd94589d3e91f2db2efcac4520e25c88ae96b74a101c688485b9b0f32ba871a53b7899e3958e96888bfa6038fd01e49d2f75ae89ddb6c0d75a4845900929c20e032cce06141b3e1a929261b4383ca095007da605f867704051ed5a489182172b586bd28bd3e64e383f3191e6703b95cf24fe84c297b74441169b8ae0e990186415c8352f387cd0cd7c635c48cbbcb105eebb3667f7cce3b83c8fa27c85eb526bdd892827e18c93f4dfeab0f0e2a863d2fd907f713583ba131ea93a01424f7962eca21494921980c8eba11d3090f9ef659f8082de66a36e5b98f0c5a3be5108a9700450347d5c93470859f63772f9aadd48ab7666fdb7682b1ba1e8f30a31e86e7e930b743d426ad59de655d4939ae6922e8515d50b74c2293718fac7719c788d2873357a58ea29068462639a544a3e95d4fed2ef3ef65d8072e508ecb4a257157ee841b94464bc0e0721509c2890c3750ee1fab0c83a745aed5c7f5196888ff1108c060212d2c8f96f5251d3709a9685fd4c68e17adbfc2cef1daf09e111622701fb4643b948afc4ec1e27b687be1be4db15973d4adb7502bb58d2f0cceec55ca7ed6bb485601594a43e12062738dd5131768ef1754d780fae776576a8de1ac53d0b9d269cbade0b6f5ca628c0d3aa4761897dfc6762aa0324e6f1476e361f4d9b0f1ed482ec117f68a335406bdb75960ca2426e00fe84f25eb72c4a69fbb8b148ba05551ce255c709d31312a088ace2aeec8fde1329982bb34743f5af60e1e6023305780e1163cc038da30c772aaf0908f3cdde0b7661f008adb8cd94f6235b51b287dbdabe99320ab9e893a83697e8b8162b3dceb052dc6560bbe4cc544f8109578f3942cb05a3579991a033e3013e97c7c6161e8b674ea310558d7bf23fc1fe873ffe60016478175f469c0bc5be91aca08523fa8a100a1d21be30d059cc1f01992bab5878e617951d0d1b3d6d73d5da5df3642bf5a077820e86b3884e5425cd040252e7b385b741305dd5a23ead3fb3b1de24dde10be4a6fa3d8fc8d937c01f96a8b67948302666713fbd041f4c0df8d17706a166945e0f0b1fcb2bce37531f34ca33ea94e354ed0fb81ef2ddcea651c82b3ae8d6f5747043e4655229eb8994c38121f793f273ccc087d4ff9ec6817685116c2b7c7cfcccc921516d7fc42f1d69384b2aaecd6a49fee53bb74fc36bf6c829758332d9b4d3e3ace2c580a5168bc38a58703985f0c2cb354f8fa2e67e162f3c9aae14e44cbc4251133cbc7039a1cd322f003781ebb116bab9c7aa8804b0d1766ee4bd91d76d204c0b4e62eb3d79ee59d988b688172b7dcdd6d1a3cecb010c49e3d5ccd3c364147e93a3cd6e8451d0501636e4ff1fd9d3d1f74e2ec4516225f57d2ed3d064c4e04a4ef71465af2afa05977d8da5e802cea0c54dd4ce02d5a6d3f381ee4aeb7f4971fcabc97be3eb6495fc76c70b489c211146f3f91f78d99e263f7162a491cc527650ed0d92fbb1feeec7e5b6e264c1167cb538fc714d0312cfe8849197175abe17e61b0edc6190856994583cebe5aff2199d3ce305d0c15fc73939bfa11c2176495f277ff11c160c2d4667e909d387f7065d6b627354031b91ad820865493806b0e4a07198f8a11ba74abc11e0f7ca6f5ec84debb5893d6fab4da562278a8969d44fafeaf5d9c748ad411d8defac8145b3e441e65b9343951c2889db82ed77d7528a2b1124d81290359cbeeb702b5d05b4b276a4fc065c27f66e919e3392302f514de98de0c2e89224558e935bf7c41b8c5614b5a6024fb02e00118d87b319b10f812f09e3df9bf1522c7c67f5e0087c64af6a1f9f4631dec8b1f2274e8d5712d49995582edc8cdbf10df2f729e5d22a38289f9a4d56bd8023bcb8f1ab895f0ea6359e60bc80e3bbc93920b4c80d989a7b1c05570cd543079c1b0afc9afae0bfbd455b643625059b83a1de2d048e1bd9853c2", @ANYRES64=0x0, @ANYRESDEC], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESOCT], @ANYRES16=0x0, @ANYRESOCT=r12, @ANYRESOCT=r13, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000001400)=ANY=[@ANYRESDEC=r12, @ANYBLOB="0fb2dedada0547181fdda9597e464d3d92dc6ddadd1586a2e85d223586da8ba4150783a1aef8bc945f8e3d910d18b4a7078d87ec2bf1169c5435ff0d2cced28d900278adf50bac3f531d9b17618e0697e280b2f578373763ebf5ab50221f21017c7eddf4cd347fa5db554a7a3ca04bbea867f13c22b51c8fc6a4723276ffdb3dc03dc1899ccaaee0c63315fa795fe03d03c44e4e89ca3d70cb117f020ccde56556bcdac950541526c09246912bce16fbddc6e16c5c703c97328be269cfaee60d2e63b760f7456478750a56dd8ac7d567160fd4846b74d3a27240304feca7fabe", @ANYPTR, @ANYPTR64], @ANYRESOCT=r14]], 0xa) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x0, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_hwaddr=@random="a1724d61b3fb"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x24) r1 = eventfd2(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002d00)=[{{0x0, 0x0, 0x0}, 0x10001}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') close(r1) preadv(r2, &(0x7f00000017c0), 0x333, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1a1042, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0xde8424a4eb10b69a, 0x4, 0x5}}}, 0xfffffdef) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r4 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r4, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) 12:46:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x0, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0xc, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:06 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x0, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:06 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) getsockname$packet(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$UI_SET_FFBIT(r6, 0x4004556b, 0x3b) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r6, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, r7, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x54, r7, 0xe82a0c42fe8796c8, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3fea}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r2, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 466.731454] audit: type=1400 audit(1573562766.900:49): avc: denied { add_name } for pid=9412 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) [ 466.866523] audit: type=1400 audit(1573562767.030:50): avc: denied { create } for pid=9412 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 466.919121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9449 comm=syz-executor.0 12:46:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x0, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x8938, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f00000000000000000000000001005e000000000008000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000006ffffffffde00000cffffff2e2f66696c6530000200000007000000000000009600000000000068622199ee62654c00fb01002ec3787872e42b78c86169b2b1d4916fa2c52a4baf4c8107d9146f669cdb3986a58d92b67fc0187200df1f9d7d25769cc9a81739a4dd5f83c0b72e4cf1e6b63b44ba81421fcef5abdef2f8cde620bb6a0d0f4f498c7bd6e4eb14ea333b3c9578ea676e5815a70c4786d1915911ac393afca39a538f59500c891d50349b"], 0xbf) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r6, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r6, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) timerfd_settime(r6, 0x0, &(0x7f0000000280)={{0x0, 0x989680}}, &(0x7f00000002c0)) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) getsockname$packet(r7, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200f1ffffff00000000"]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x0, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x0, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000000)=""/132) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000020221"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) [ 467.291391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9449 comm=syz-executor.0 12:46:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f00000001c0)=""/69) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x4182) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x8, 0x20, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x0, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:07 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x3936}, 0x9ff4f6d5a5f96c97, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000ff7f0000000000000007002e2f66696c6530400200000000000000000000005e000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c6530010300000007000000000000000cffffffffffffffc907002e2f66696c6530000200000007000000000000009600000080000000fb01002e"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x0, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:07 executing program 0: setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x8, 0x3, 0x7f}) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r5 = request_key(&(0x7f00000005c0)='cifs.spnego\x00\x1f\xbf\xd1\xed\xc4C\xab\x88\xa2\a\xd8G\xff\xe8\x82\xca\xdb\x91$\x94\xcdF\x82\xf1\x10\"[\x857b,8', 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000900)='keyring\x00', 0x0, 0x0, 0x0, r5) keyctl$negate(0xd, r5, 0xfffffffffffffffe, r5) keyctl$search(0xa, r4, &(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000380)={'syz', 0x0}, r5) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="bf00000029000002000000130000000004fbffffff00000000000000000000008107002e2f6669b6af308200000000020000000000000000000000000000020007002e2f66696c6530000200000000000000000000007e3a63fc299dcdf500e6002e2f66696c65300402000000060000000000000000000000000000000107002e2f66696c6530010000000009000000000000000cffffffffffffff0007002e2f66696c65300002000000ea0000000000000000000000000000000032fe2ed1b18b33646d0a36d2528271be670dc88177a70400ccc135bab3338687dc9dad530fad91"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x147, 0xcc0}]) 12:46:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x0, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x0, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) 12:46:08 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r6, 0x2, 0x2) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x802, 0x0) write$UHID_DESTROY(r7, &(0x7f0000000300), 0x4) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x3}}, 0x18) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x0, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x0, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r1, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000002c0)={0xd, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x102020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x5, 0x6, &(0x7f00000001c0)) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x4182) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0c00230029000002000000"], 0xb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000001c0)={0xa, &(0x7f0000000380)=[{0xeb0, 0x2, 0x7, 0xfffffffd}, {0x1, 0x7, 0x5, 0x7fffffff}, {0xff7f, 0x7, 0x80, 0x1}, {0x5, 0xf9, 0x20, 0x2}, {0x7ff, 0x0, 0x80, 0xffff}, {0x2, 0x4, 0x40, 0x6}, {0x3f, 0x80, 0x1, 0x1}, {0xd6, 0xbb, 0x80, 0x9550}, {0x0, 0x1, 0xcb, 0x8a}, {0x1, 0x7f, 0xfe, 0x8}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe2217a7aae6f709f}, 0x8ad2f65231400b68) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='./file0\x00') 12:46:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x4182) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0xbf, 0x29, 0x0, {0x2, [{{0x0, 0x0, 0x4}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x0, 0x1, 0x7, './file0'}, {{0x1, 0x0, 0x7}, 0xffffffffffffff0c, 0x0, 0x7, './file0'}, {{0x0, 0x2}, 0x0, 0x0, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r3, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:08 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, 0x0, 0x0) r3 = accept(r2, &(0x7f0000002600)=@in={0x2, 0x0, @empty}, &(0x7f0000001380)=0x80) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000002680)='tls\x00', 0x4) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(r5, 0x10, &(0x7f00000000c0)) setsockopt$inet_int(r5, 0x0, 0x0, &(0x7f00000000c0), 0x4) socket(0x100000000011, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2}, 0x0, @in6=@dev}}, 0xe8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 12:46:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x81, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0x81) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 5: pipe(0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) 12:46:09 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x71) getsockopt$sock_buf(r0, 0x1, 0x2d, 0x0, &(0x7f0000000100)) 12:46:09 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) getsockname$packet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @multicast1}, 0x120, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)='rose0\x00', 0x1, 0x2, 0x2}) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x33, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000001c0)={0xa, &(0x7f0000000380)=[{0xeb0, 0x2, 0x7, 0xfffffffd}, {0x1, 0x7, 0x5, 0x7fffffff}, {0xff7f, 0x7, 0x80, 0x1}, {0x5, 0xf9, 0x20, 0x2}, {0x7ff, 0x0, 0x80, 0xffff}, {0x2, 0x4, 0x40, 0x6}, {0x3f, 0x80, 0x1, 0x1}, {0xd6, 0xbb, 0x80, 0x9550}, {0x0, 0x1, 0xcb, 0x8a}, {0x1, 0x7f, 0xfe, 0x8}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe2217a7aae6f709f}, 0x8ad2f65231400b68) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='./file0\x00') 12:46:09 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000001c0)={0xa, &(0x7f0000000380)=[{0xeb0, 0x2, 0x7, 0xfffffffd}, {0x1, 0x7, 0x5, 0x7fffffff}, {0xff7f, 0x7, 0x80, 0x1}, {0x5, 0xf9, 0x20, 0x2}, {0x7ff, 0x0, 0x80, 0xffff}, {0x2, 0x4, 0x40, 0x6}, {0x3f, 0x80, 0x1, 0x1}, {0xd6, 0xbb, 0x80, 0x9550}, {0x0, 0x1, 0xcb, 0x8a}, {0x1, 0x7f, 0xfe, 0x8}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe2217a7aae6f709f}, 0x8ad2f65231400b68) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='./file0\x00') 12:46:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000440)) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x2200008, &(0x7f0000000040)=ANY=[@ANYBLOB="6d6f64653d30303047303030303030303030303030303030303030302c7375626a5f747970653d636d646c696e650030003197c243fcfca4bcf18737543960dfdf81a7291fcec2e989b1a7443ef319505757bf2b58c3826aa825fbf3d11e9a485a29ef7b5090f507015f00e4583167b77406c73c586b050065e06bcd327807000000000000000046958771af3aed366344de441ce32533390862a2c3a023b1210ea2b84bc44d66e1318f6fb8189bdd6afb1855c380c340"]) [ 469.182219] audit: type=1400 audit(1573562769.390:51): avc: denied { setopt } for pid=9701 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:46:09 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r5, r5, 0x0, 0x24000058) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x1) r7 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x0, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @remote}, 0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@initdev, @remote, 0x0}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', r1}) recvmmsg(0xffffffffffffffff, &(0x7f0000005740)=[{{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000002c0)=""/2, 0x2}, {&(0x7f0000000300)=""/169, 0xa9}, {&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000400)=""/84, 0x54}, {&(0x7f0000000480)}], 0x6, &(0x7f0000000540)=""/60, 0x3c}, 0x2}, {{&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/202, 0xca}], 0x2, &(0x7f0000000840)=""/4096, 0x1000}, 0xa4a4}, {{&(0x7f0000001840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000018c0)=""/133, 0x85}, {&(0x7f0000001980)=""/108, 0x6c}, {&(0x7f0000001a00)=""/167, 0xa7}], 0x3, &(0x7f0000001b00)=""/29, 0x1d}, 0x4}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/207, 0xcf}], 0x1, &(0x7f0000001c80)=""/150, 0x96}, 0x3}, {{&(0x7f0000001d40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003080)=[{&(0x7f0000001dc0)=""/183, 0xb7}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/167, 0xa7}, {&(0x7f0000002f40)=""/233, 0xe9}, {&(0x7f0000003040)=""/45, 0x2d}], 0x5, &(0x7f0000003100)=""/24, 0x18}, 0x80}, {{0x0, 0x0, 0xffffffffffffffff}, 0x5}, {{&(0x7f0000003140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003340)=[{&(0x7f00000031c0)=""/25, 0x19}, {&(0x7f0000003200)=""/118, 0x76}, {&(0x7f0000003280)=""/148, 0x94}], 0x3, &(0x7f0000003380)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000005680)=[{&(0x7f0000004380)=""/99, 0x63}, {&(0x7f0000004400)=""/144, 0x90}, {&(0x7f00000044c0)=""/4096, 0x1000}, {&(0x7f00000054c0)=""/170, 0xaa}, {&(0x7f0000005580)=""/209, 0xd1}], 0x5, &(0x7f0000005700)=""/33, 0x21}, 0x7f}], 0x8, 0x40000100, &(0x7f0000005940)={0x0, 0x989680}) getsockname$packet(r2, &(0x7f0000005980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000059c0)=0x14) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000005a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005a40)=0x14, 0x80800) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000005b00)='/dev/vga_arbiter\x00', 0x8000, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000005b80)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000005d00)={&(0x7f0000005b40)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f0000005cc0)={&(0x7f0000005bc0)={0xcc, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc7dc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2ca}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60}]}]}]}, 0xcc}}, 0x800) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000005d40)='/dev/zero\x00', 0x810000, 0x0) r7 = socket$netlink(0x10, 0x3, 0xd) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000005dc0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000005e80)={&(0x7f0000005d80)={0x10, 0x0, 0x0, 0x2400108}, 0xc, &(0x7f0000005e40)={&(0x7f0000005e00)={0x1c, r8, 0x0, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x14008801}, 0x80) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000005ec0)='/dev/vga_arbiter\x00', 0x40100, 0x0) r10 = syz_genetlink_get_family_id$nbd(&(0x7f0000005f40)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f0000006000)={&(0x7f0000005f00), 0xc, &(0x7f0000005fc0)={&(0x7f0000005f80)={0x20, r10, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x20000c01) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x5) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000006100)={r9, 0x10, &(0x7f00000060c0)={&(0x7f0000006040)=""/122, 0x7a, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000006140)=r11, 0x4) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000006180)='/proc/self/net/pfkey\x00', 0x420000, 0x0) write$P9_RWALK(r12, &(0x7f00000061c0)={0x3d, 0x6f, 0x2, {0x4, [{}, {0xa6fa7dfd3005d6a7, 0x4}, {0x8, 0x3, 0x2}, {0x22, 0x3, 0x3}]}}, 0x3d) getuid() ioctl$BLKROSET(r6, 0x125d, &(0x7f0000006200)=0x10000) recvmsg(r2, &(0x7f0000006580)={&(0x7f0000006300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006380)=""/143, 0x8f}, {&(0x7f0000006440)=""/5, 0x5}], 0x2, &(0x7f00000064c0)=""/156, 0x9c}, 0x10000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r13, 0x6, 0x16, &(0x7f00000065c0)=[@mss={0x2, 0xff}, @timestamp], 0x2) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000006600)='coredump_filter\x00') ioctl$KDGKBMETA(r14, 0x4b62, &(0x7f0000006640)) r15 = accept4$packet(0xffffffffffffffff, &(0x7f0000006680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000066c0)=0x14, 0x80000) sendmsg$sock(r15, &(0x7f0000006b40)={&(0x7f0000006700)=@pptp={0x18, 0x2, {0x1, @empty}}, 0x80, &(0x7f0000006a80)=[{&(0x7f0000006780)="9a2bbbe1f8042bf1d92597e9fa57884cc04bb01ea4479cb9ca33fe12292385cc3e066dc08b17f5045ba56e80c8296da9b70f2cd827406ea14c7c8969559cb2f0c68d44e24df3f345de187d7d33282ed99e36d8ab25069a933e90c05089bab2fc229e7a4799de5097", 0x68}, {&(0x7f0000006800)="99b6728e3aca7bce90e3a65fbb4c8172280d960a2a0b07c219150401f71d842b7621cd5403e21e88b8fc0613ce5b19ecf5a8f1158deacfd3325c0160a255c98fc7b6bd021ad35072b29fe8ad1f8086f5c7d4ab4c8d844c5d2088502daae9181f05eb1c100d6d3f26a5421b87ed4b709d34c9ccce21464400db55cd2f4efd8644753473feb6853000f2355b5636242891eeaa858a56fb342e09286817b44ff1a49c8a62ed435241ad1ed7ef57d448c17c72d116d501342132c820863c0d9dbf07c6454815c99ad2473b2a90", 0xcb}, {&(0x7f0000006900)="9cda28aaa1b7af8be794d620e788e8942feea49b6528c8754276e7d2c2e343ccdbdb6ad44e46b41bb40621bf02154728cf2c0a8b9e28f7208460f7ee6ea0d7bb4d869cc75f", 0x45}, {&(0x7f0000006980)="195f655429b21ec0ef6ee9957051a4dde104ef678b0c0b85cda8ddf1573ff647a61a4baf13a4a118b9e4094072e0526e65bcc2dec14e82f399f60d47784810953a8328ce605bdaea64629cbcd7927087b2ddea08fc666962904704899dfda9f5c3ff77e37abe2d792cf464b5f76c7e8b765559", 0x73}, {&(0x7f0000006a00)="1511c05eb77565acf37d2f7d51febd892f58f956f26ae627b70d0bf1fd6cb76063b9f4de1438d727fd068380a685943cb0fdeca9598527700dd9d53f708563f22f464cbce73ede9f13c6fb02bb4dc30528f5dc8022f64089032aa3e9161707a4175b3d81d83fc1cdc3f331246fecfdb4", 0x70}], 0x5, &(0x7f0000006b00)}, 0x4000) 12:46:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000001c0)={0xa, &(0x7f0000000380)=[{0xeb0, 0x2, 0x7, 0xfffffffd}, {0x1, 0x7, 0x5, 0x7fffffff}, {0xff7f, 0x7, 0x80, 0x1}, {0x5, 0xf9, 0x20, 0x2}, {0x7ff, 0x0, 0x80, 0xffff}, {0x2, 0x4, 0x40, 0x6}, {0x3f, 0x80, 0x1, 0x1}, {0xd6, 0xbb, 0x80, 0x9550}, {0x0, 0x1, 0xcb, 0x8a}, {0x1, 0x7f, 0xfe, 0x8}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe2217a7aae6f709f}, 0x8ad2f65231400b68) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='./file0\x00') 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x0, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x82) sendto$inet(r0, &(0x7f0000000000)="44eb0ee473fc0000490000c5350949c69f05000000", 0x15, 0x0, &(0x7f0000002000)={0x2, 0x0, @multicast1}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x78f400, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) 12:46:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000d40)=ANY=[@ANYBLOB="ffd934aa54cdfc17009c37dfb755c6d450726f13c9f79a076b92e304fcffffffefffffff0000000000001b"], 0x2b) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl(r4, 0x5, &(0x7f0000000100)="c6a4489850bbfc6d7bb09f8da2cbf7352ebacf3dff8bf8cffbfb5cf3144370d62cc1e8281aedcc1c4d13aa3b0fd0eb00747b6b5510564f10697ae636bd335aaca1965169cb01101e039219d3f23bc984cf9e70ec2fc60005521242a815102da4b5d7e50f62703faab7b4fc166565be603ba7c0fcedff1d85786b991513b5a20d2b") dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) 12:46:09 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='\x00') ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x0, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x4000000000005) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r1, r0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = dup(0xffffffffffffffff) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000100)) syz_open_procfs(r6, &(0x7f0000000040)='mounts\x00') fallocate(r3, 0x20, 0x5, 0x2000000) write$UHID_INPUT(r5, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 12:46:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x0, 0x0, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:09 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x0, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:10 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2, {0x0, 0x0, 0x665919b0}}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) 12:46:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x20000000000004, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ftruncate(0xffffffffffffffff, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RCLUNK(r2, 0x0, 0x320) open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) 12:46:10 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x9, 0x8001, 0x8, 0x8, 0x3, 0x7}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0x9a, 0xde, &(0x7f0000000380)="d829ce40c1fe99cdf15bfabab1f95a2680a2f1bb6aff30c45683a77391cf3410560d89e94958994767c87a2c1c55ffdb9bb5497bc8460d6200d1308734093b8bc9c6560da9a7f64e6a9bd8958735856a0af9aa8a36a3afe6f0620ddd6c12de028599f03ed158687b0ff8b0ae05226db7249bedfd9e02cae775e93e618a2f4e3321d9f34021558006caeb45a281b53533be24bc754c4707db09b6", &(0x7f0000000540)=""/222, 0x2, 0x0, 0xd6, 0xf, &(0x7f0000000640)="420d3191ab7b5cedcb4098b0961896f0fd4e6c588dfdfc321fa5ed52c01f291f9def5af88a62422f8b6677aba6ce446138c280845dfd37f8437d4b22bd857189e3b533dcc50693a355886576db990264acf6b600bf96fe866640e67b489c1c07cc3758192acd40d0816e9d7583ee66bab9230fc1ec63ba2191cbb01d6961afa100e6b76134d90cc1de6c77b334d46e1dbf47cbc6e2a67e3cd6b75a10f2ea9733c2771dc530304274c6ba8e91db1bf154c1d97ad677ce143be2e729cd3cb845719374684e590a81393de2aafeec77032287783d37edfc", &(0x7f00000001c0)="aa4e6f320b13a3c1c6bf46ef6d13ce"}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r6 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)="06", 0x1}], 0x0, 0x9) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000280)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r4, 0x401845e0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="bf000000290200020000002000000000000000000000000004000000000000008107002e2f66696c653082010000000200000000000000fa7f0000000000000007002e2f66696c6530f1c037400200000000000000000000005d000000000000000807002e2f66696c65300002000000060000000000000003000000000000000107002e2f66696c65300100000007000000000000000cffffffffffffffc907002e2f66696c6530000400000007000000000000009600000000000000f901"], 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) getsockname$packet(r7, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r7, 0x0, 0x83, &(0x7f00000008c0)={'nat\x00', 0x0, 0x4, 0x92, [], 0x7, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000800)=""/146}, &(0x7f0000000940)=0x78) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r8, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:10 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000000380)="9cc68e1ee928173c33d55bb112be98b1ea9898ee8be7d702898bdb96c2ab9bb707fe27ead7f7aac933b3560342567dfbe4919edd08b540f2b31ddd247fd1c1aee603521c8ddc8cbbf3fc4a2e52b67cc03cba9336732a34a0c1264acd841ededcc04818c6269ddb5d7135e5cf07816aa0ad18d2c5ad70448e5e642e67", 0x7c}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000400)="dc8bcb9e67eff3af335c9102f895f4e8f47e8ebed1d20a323ccdadd55b3d5746a3080a2cb84abf3596eca5de60eeeeffa7b7c3688252fe8545a34ae0cade1f4293f1d0a8aeaabf6b0be0fab2a3", 0x4d}, {&(0x7f00000001c0)="a2136402dfab3fa61ee929009cdccb", 0xf}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f0000003540)="7e852669fd5a09f20a3fa524208badcd042fc2db47e0ac381d905d2ceeb82d02a1f1af7c984c05be46732dea58939bac6dc7d5638e3adfd8f16ceb2281280689b08391ae1454054f93a4c06b2a7ab4d860ead6fe6370ff97aeca3cd53720b496bbb3e650dfad6e779dcea7579814e4ddbf1c8f879b38cedf0ed988b2d639df734c2af4a9e381606569772048516d74ef8443ea90cb0207f0c4c1f1053e81", 0x9e}], 0x7}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) getsockname$packet(r6, 0x0, 0x0) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f00000036c0)="80a5af8a6d02e7f983e840bdc7143d2e65fa37c2cb8e2051d64904a222e736b22629fe49da0b00040d23f04578b9646990b6c164009de13e926007299fde56429ed5615aad7a5ce2e35c643d5e9aa7b6e89b7b3c793b64c3c97eebd8d4f0293e77f2af697282bd7aedbdd0ae7c907eb926d0e49126c443cfcea698557297d4fc8be65396d019d6e0a9b3d08fc760ec3576a7d92ce1ae095f8f0a5e5ddbbb6b276f08fea6624a53f81202fbcbadcaa7b3dcb9a70517cfdf06cc2ac2e946c3b94dca769e3965c9e556cde96cde386b57e516834a4457100e1beba9a27d19416d9f550d807ffe9bb09d9a70c168b6fa8645", 0xf0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f0000003680)='y\x00', 0x2, 0x2) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000037c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r8, 0x4c08, 0x3) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:11 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001100)=ANY=[@ANYBLOB="7365637572697479000000000000000000000300000e002000040000004005009cea5574b96ef460ad9a4dcd8de9a14e00480200000000000048020000500100000000000070040000700400007004000070050039300400000400000016b2ec704288d91c064dbbf27de2ab16b4e22e887417863830e57e4f9468fbee1b2e0ad2e2de4b87806e220da00371af4bac1222691c6483d48f1daa3d8e958fa694f4b03aa4e2d790e774aa291f8c7e3ba31e6d8ab771ee841b7bad29b43c1f97d3d32142777ddfb6d222300f1baa6579c713b09f66cc393de920688b5c39d50cd87e8e93f0b88757a4a081d104669d0004000025ca316ec57f57e1bdcad41772276743bef622c50756202dcb22e4481a4799e665c18fcae8254b5ef63d5b77aefac370c8a16bb03640783c73be4aa22329ce7a21b71e09fc5ee8f4ecf505383585ddbdcf8fd0e32b36be233189e9c0f958107a25f916d82825d06440f4988c5767c7341037a234fc3cf514d61be514fd11", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x5a0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1, 0x100000}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000080), 0x4) 12:46:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:11 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:11 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='net/rt6_stats\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r3, 0x401845e0, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1, 0x2}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000300)=0xc) prlimit64(r6, 0x8, &(0x7f0000000380)={0x1, 0x1}, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r7, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:11 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x108000) truncate(&(0x7f0000000240)='./bus\x00', 0x7fff) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYRES32=r5, @ANYRESHEX=r5], 0xfffffd24) r6 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8fff) 12:46:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:11 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x3}) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x3b52996ab76bd80b}}, 0x1c}}, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r11, r12) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@polexpire={0xec, 0x1b, 0xf10, 0x70bd2c, 0x25dfdbfc, {{{@in6=@loopback, @in=@loopback, 0x4e22, 0x0, 0x4e21, 0x7f, 0x0, 0x20, 0x180, 0x62, r9, r11}, {0x6, 0xfffffffffffffff7, 0xb50, 0x67fe, 0x80, 0x0, 0x800, 0x101}, {0x6, 0xffffffffffffffe1, 0x0, 0x5}, 0xffff, 0x6e6bb2, 0x1, 0x2, 0x1, 0x3}, 0x5}, [@user_kmaddress={0x2c, 0x13, {@in=@loopback, @in6=@local, 0x0, 0x2}}]}, 0xec}}, 0x0) close(r5) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0x4ffe0, 0x0) 12:46:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x108000, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:11 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f00000002c0)={0x9, 0x0, 0x0, 0x8, 0x3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r1, 0x2, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) 12:46:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setflags(r5, 0x2, 0x0) 12:46:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') r3 = memfd_create(0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x81805) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xa0, 0x29, 0x2, {0x2, [{{0x20, 0x0, 0x4}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x0, 0x2}, 0x0, 0x0, 0x7, './file0'}, {{0x40}, 0x5e, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x7}, 0x0, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0x0, 0x1, '.'}]}}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000200)) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x108000, 0x0) fcntl$setflags(r4, 0x2, 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0xcc0}]) [ 471.158358] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 12:46:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') preadv(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="7cb7a69c3976ad718fbfd1d7801a14171f089e55f29d8915873746dd45c29a9c"}}) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0xbf, 0x29, 0x2, {0x2, [{{0x20}, 0x4, 0x81, 0x7, './file0'}, {{0x82, 0x1}, 0x7fff, 0x0, 0x7, './file0'}, {{0x40, 0x2}, 0x5e, 0x8, 0x7, './file0'}, {{0x100, 0x2, 0x6}, 0x3, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x7}, 0xffffffffffffff0c, 0xc9, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x96, 0xfb, 0x1, '.'}]}}, 0xbf) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) fcntl$setflags(r5, 0x2, 0x0) [ 471.206625] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.249927] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.305054] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.357430] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.403793] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.436504] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 471.465570] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9971 comm=syz-executor.0 [ 473.476456] lowmemorykiller: Killing 'syz-executor.2' (13078) (tgid 13078), adj 1000, [ 473.476456] to free 52492kB on behalf of 'kswapd0' (33) because [ 473.476456] cache 65048kB is below limit 65536kB for oom_score_adj 12 [ 473.476456] Free memory is -8336kB above reserved [ 473.504560] lowmemorykiller: Killing 'syz-executor.5' (8480) (tgid 8480), adj 1000, [ 473.504560] to free 41400kB on behalf of 'syz-executor.5' (9987) because [ 473.504560] cache 64348kB is below limit 65536kB for oom_score_adj 12 [ 473.504560] Free memory is -12840kB above reserved [ 473.504611] [ 473.504613] ================================= [ 473.504615] [ INFO: inconsistent lock state ] [ 473.504623] 4.9.194+ #0 Not tainted [ 473.504625] --------------------------------- [ 473.504629] inconsistent {RECLAIM_FS-ON-W} -> {IN-RECLAIM_FS-R} usage. [ 473.504637] syz-executor.5/9987 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 473.504662] (&mm->mmap_sem){+++++?}, at: [<0000000087737afc>] get_cmdline+0xa3/0x2d0 {RECLAIM_FS-ON-W} state was registered at: [ 473.504677] mark_held_locks+0xb1/0x100 [ 473.504683] lockdep_trace_alloc+0x18c/0x2b0 [ 473.504691] __alloc_pages_nodemask+0x143/0x1a80 [ 473.504698] __pmd_alloc+0x4a/0x330 [ 473.504706] move_page_tables+0xadb/0xd60 [ 473.504712] shift_arg_pages+0x1ae/0x470 [ 473.504717] setup_arg_pages+0x60d/0x7c0 [ 473.504729] load_elf_binary+0xa84/0x4a90 [ 473.504737] search_binary_handler+0x14f/0x700 [ 473.504743] do_execveat_common.isra.0+0xf81/0x1db0 [ 473.504748] do_execve+0x3a/0x50 [ 473.504757] run_init_process+0x33/0x37 [ 473.504763] try_to_run_init_process+0x18/0x48 [ 473.504772] kernel_init+0xf2/0x163 [ 473.504778] ret_from_fork+0x5c/0x70 [ 473.504780] irq event stamp: 1103507 [ 473.504796] hardirqs last enabled at (1103507): [<00000000bad5286b>] vprintk_emit+0x25c/0x6f0 [ 473.504804] hardirqs last disabled at (1103506): [<000000009f2ac57c>] vprintk_emit+0x6d/0x6f0 [ 473.504814] softirqs last enabled at (1103492): [<00000000ef4e0a37>] wb_queue_work+0x1ed/0x450 [ 473.504822] softirqs last disabled at (1103488): [<00000000a7e2a1b6>] wb_queue_work+0x90/0x450 [ 473.504824] [ 473.504824] other info that might help us debug this: [ 473.504826] Possible unsafe locking scenario: [ 473.504826] [ 473.504827] CPU0 [ 473.504828] ---- [ 473.504833] lock(&mm->mmap_sem); [ 473.504835] [ 473.504839] lock(&mm->mmap_sem); [ 473.504840] [ 473.504840] *** DEADLOCK *** [ 473.504840] [ 473.504844] 1 lock held by syz-executor.5/9987: [ 473.504860] #0: (shrinker_rwsem){++++..}, at: [<000000003ecc3654>] shrink_slab.part.0+0xb2/0xa20 [ 473.504862] [ 473.504862] stack backtrace: [ 473.504870] CPU: 1 PID: 9987 Comm: syz-executor.5 Not tainted 4.9.194+ #0 [ 473.504886] ffff88018fd4f070 ffffffff81b67001 00000000000000f0 ffff8801ab1c2f80 [ 473.504896] ffffffff83cb0630 ffff8801ab1c3878 ffffffff84252000 ffff88018fd4f0e8 [ 473.504906] ffffffff81408710 0000000000000000 ffffffff00000001 0000000000000001 [ 473.504908] Call Trace: [ 473.504919] [<00000000d9d18b13>] dump_stack+0xc1/0x120 [ 473.504931] [<000000008e0aa140>] print_usage_bug.cold+0x452/0x5a2 [ 473.504939] [<00000000e13179e8>] mark_lock+0x6c7/0x12e0 [ 473.504946] [<00000000a4e1b23b>] ? print_irq_inversion_bug+0xa0/0xa0 [ 473.504953] [<00000000ba79a463>] __lock_acquire+0x5be/0x4390 [ 473.504962] [<000000009823595b>] ? trace_hardirqs_on+0x10/0x10 [ 473.504969] [<000000009823595b>] ? trace_hardirqs_on+0x10/0x10 [ 473.504978] [<0000000098022865>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 473.504986] [<000000002df3bd06>] lock_acquire+0x133/0x3d0 [ 473.504992] [<0000000087737afc>] ? get_cmdline+0xa3/0x2d0 [ 473.505000] [<00000000f3e02c33>] down_read+0x44/0xb0 [ 473.505007] [<0000000087737afc>] ? get_cmdline+0xa3/0x2d0 [ 473.505013] [<0000000087737afc>] get_cmdline+0xa3/0x2d0 [ 473.505023] [<000000007eed0dad>] handle_lmk_event+0x169/0x920 [ 473.505030] [<000000009c17570e>] ? lmk_event_show+0x390/0x390 [ 473.505037] [<000000002ae217d8>] ? vprintk+0x28/0x30 [ 473.505044] [<0000000098022865>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 473.505054] [<000000008ffa2da1>] ? kill_pid_info_as_cred+0x540/0x540 [ 473.505065] [<00000000833b1f00>] ? check_preemption_disabled+0x3c/0x200 [ 473.505074] [<00000000833b1f00>] ? check_preemption_disabled+0x3c/0x200 [ 473.505083] [<00000000833b1f00>] ? check_preemption_disabled+0x3c/0x200 [ 473.505090] [<000000001915dccd>] ? lowmem_scan+0x6ae/0xb70 [ 473.505098] [<0000000037f82294>] lowmem_scan+0x6f3/0xb70 [ 473.505107] [<00000000299601f9>] shrink_slab.part.0+0x3cf/0xa20 [ 473.505116] [<000000007ae85bd1>] ? unregister_shrinker+0x230/0x230 [ 473.505126] [<0000000098370233>] ? mod_delayed_work_on+0xe5/0x140 [ 473.505135] [<000000005fe3046f>] ? __local_bh_enable_ip+0x6a/0xe0 [ 473.505145] [<000000008d299679>] shrink_node+0x1ed/0x750 [ 473.505153] [<000000005fe3046f>] ? __local_bh_enable_ip+0x6a/0xe0 [ 473.505162] [<00000000bdbe17db>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 473.505170] [<000000008b8ab8f5>] ? wakeup_flusher_threads+0x27c/0x480 [ 473.505177] [<00000000a8dc01dc>] ? wakeup_flusher_threads+0xdb/0x480 [ 473.505186] [<000000007f03a3ba>] try_to_free_pages+0x397/0xbd0 [ 473.505194] [<00000000c27cf757>] ? shrink_node+0x750/0x750 [ 473.505203] [<00000000afe2d137>] __alloc_pages_nodemask+0x930/0x1a80 [ 473.505213] [<000000008f124673>] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.505221] [<00000000ec1a45a2>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 473.505229] [<000000004dbaf7eb>] ? retint_kernel+0x2d/0x2d [ 473.505239] [<000000002c29679c>] __vmalloc_node_range+0x25b/0x610 [ 473.505249] [<000000009f8d87a4>] ? xt_alloc_table_info+0xc8/0x100 [ 473.505257] [<000000006830cfc1>] vmalloc+0x5c/0x70 [ 473