) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:06 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000000)={{0x1, 0x0, @descriptor="767038f9eaa6f380"}}) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x193) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:06 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:07 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:07 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10, r0}) 03:39:07 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:07 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x200, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '/selinux/policy\x00'}, &(0x7f0000000080)='(\x00', 0x2, 0x2) 03:39:07 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:07 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:07 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x6a3a38632ca9486f, 0xffffffffffffffff, 0x3, 0x8) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) write$P9_RRENAME(r3, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) 03:39:07 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:07 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) clock_gettime(0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:07 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:07 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:07 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:08 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:08 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x6, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10, r0}) 03:39:08 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:08 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_udplite(0xa, 0x2, 0x88) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x8, 0xa76acc871e736e22) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f00000000c0)={0x600d52d2e4ebec5a, 0x70, 0x63, 0x6, 0x7, 0xa2, 0x0, 0x9d9, 0x8010, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x5c0, 0x5, 0x80, 0xb, 0x22, 0xe5, 0x383}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10, r0}) 03:39:08 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:08 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:08 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:08 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10, r0}) 03:39:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10, r0}) 03:39:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10, r0}) 03:39:09 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10, r0}) 03:39:11 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10, r0}) 03:39:11 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:11 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:11 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:11 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10, r0}) 03:39:11 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) r5 = openat$cgroup_int(r3, &(0x7f0000000000)='notify_on_release\x00', 0x2, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000040)={0x1, 0x8, 0x9}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10, r0}) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x0, r0}) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x0, r0}) 03:39:11 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = creat(0x0, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000000)=0x7) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x0, r0}) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:11 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:11 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:11 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:11 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x4000, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x100, 0x4e23, 0x0, 0xa, 0x80, 0x80, 0x0, r6, 0xee00}, {0x8, 0x8, 0x8, 0x6, 0x100000001, 0x5, 0x7f, 0x4}, {0xa7e, 0x9a1d, 0x1, 0xcd}, 0x101, 0x6e6bb1, 0x5, 0x1, 0x1}, {{@in6=@mcast2, 0x4d6, 0x3c}, 0xa, @in=@multicast2, 0x3502, 0x0, 0x3, 0x1, 0xffffffff, 0x5, 0x2}}, 0xe8) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r8, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:11 executing program 0: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:11 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket(0x2, 0x80804, 0x8) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:12 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:12 executing program 0: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:12 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:12 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000000)=""/50, 0x9}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x44) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:12 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 0: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:13 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 03:39:13 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:13 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="964535373707366f896f678aa7d407cb", 0x10) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:13 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:13 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) sendmsg$sock(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)="7f71ed0fd33fd0a486e0b2fbafda6113562d74eb8591cb69254da296bf123c64afc86450fbbd11c1fa46464aa6feaee6dc4db7dc3d074234496d30b82dd177599ed67a9cf359f056792766c16cb43ef07af6d713bc3650cff57039be3aff2a2a17c12df13868aa9edd292e521e2ead9bc21d09ae6f7e8f7b41ca2265d26fff7bc5975cab675cb6d694d0cec658a6ddb886857bd30baf48e77e93b0e00bcf67386a8769fcfbcdf36f6a52927dff129d672a19ab61159cd2942a4b2e4ac7bab9aab01db10f318a3d4cab38c28b01783689367912b2cc90f518323f2be35528d8c55ddf40a4f9e808332ba8d8fa732b5acab3c9abdc", 0xf4}, {&(0x7f0000000100)="23cce3ce3f02d8f6990008b0ee856408b6d08b11b4811f6f", 0x18}, {&(0x7f0000000280)="1716b821dab64e33e6da11165b95f013eac23eca043934ccda597ecb33cf13a408581724691e493a68c3d3818ec8b4d51613bd6f77d23272427d9629c32aec63c9f04d1aca4ae1f37ec0fd65ce29d5e6e71f0fbbade8446db0e3eadc63ba18b4ccc790cc3e8bd8c8da99291f7f8b936b7d589219a217675c437ba7fc00e93828db2a484a74f165947bb0f4cfd1020b87da79555d223a1146d21e", 0x9a}, {&(0x7f0000000340)="d78d5ce524f8ca4fe10ab9ad6c35364d54c03a1dc4526a7079742dbaeb45f3956cee7ac6f21152d188b61b6a451b6a0cc6d96e87d59d1f98ae3a7642f688025255b63155fd6097cff71d88515d9fb761bd3cfee3f1541e8e608e518522e2f56d7896043c89a280be4cb0df87f3a26fb41fe519c198aff532e2991c31f672560384e8d20d43fa57d4d6309fced101151069074bab3ec7a193d1a9f00e6f8f178dfd76268cf3a112ba681b5b25344d091d439cd9729c2f1dbf512b94ee2e9b5e79", 0xc0}, {&(0x7f00000001c0)="d16cb1da24d335e6036ff6274012837d05c784a18e39d11f128197d7055cd94a47ba60d44eeb849715714d1e569ebfb3c5ce8439a1ee18cc56e86432c04bf9e29a96afa52d17aa4a04", 0x49}, {&(0x7f0000000440)="abd798bb4e1e8da3682d0b390bcc9be2d21072c9e98d42e2e6b14397928c5b456f5b044a252e4fc729665884e1c3ebf923934b54419285e5071641eb574dc6f03abddd1f2d50cb54063a49af06506f3c1e8bd7e860f98d26b2b8acbd9b4ddc9ca01d9548146d13dfcc6985736a896cd9f8ea99f7cc8d29a50d6521c500871e4b1b60642977072b038a007f099a41fc5ce0c433b22869f2e0c560b57730114785b18d0527151257a9c88af32c10a753", 0xaf}, {&(0x7f0000000500)="deb3f02bbe0ad40d84116eff44f6f46938410b1037b513589f1040823b29f654b7", 0x21}], 0x7, &(0x7f00000005c0)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x40008000) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:13 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:13 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) 03:39:13 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000340)='posix_acl_access*\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r2, 0x35, 0x35e}, &(0x7f0000000680)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000740)="c191d54428e32b413affbe0ce9549505cf224be679783ace910c52c9e720c8509e07c042e9697a46664c2b62961407273734c03633", &(0x7f0000000300)=""/24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x1, 0x3, 0x10000, 0x1, 0x0, 0x0, 0x1}, 0x34e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r8, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32, @ANYRES32=r7, @ANYRES16=r8, @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, r2, r3, r9) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r10 = socket(0x10, 0x2, 0x0) r11 = syz_open_procfs(0x0, 0x0) sendfile(r10, r11, 0x0, 0x80000002) syz_open_pts(r11, 0x80440) readlinkat(r11, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=""/93, 0x5d) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r12 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r12, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r13 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400400, 0x0) ioctl$KDGETMODE(r13, 0x4b3b, &(0x7f00000000c0)) creat(0x0, 0x0) 03:39:13 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) 03:39:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) 03:39:13 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:13 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x4, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x7, 0x7, 0x1, 0x800}, 0x10) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000000)=""/95, 0x401}) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:14 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1d) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x38488}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:14 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:14 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:14 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 1: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendfile(r0, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:14 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={0x0}, 0x0, 0x542, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@mpls_newroute={0x64, 0x18, 0x0, 0x70bd2d, 0x25dfdbfb, {0x1c, 0x80, 0x30, 0x5e, 0xfd, 0x2, 0xff, 0x9, 0x800}, [@RTA_MULTIPATH={0xc, 0x9, {0x8001, 0x3, 0x9b, r3}}, @RTA_MULTIPATH={0xc, 0x9, {0xb211, 0x6, 0x9, r4}}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x7f}, @RTA_VIA={0x14, 0x12, {0x10, "dcb4dfe0a1b2a3cd914765bd035b"}}, @RTA_VIA={0x14, 0x12, {0xa, "59b41d3109efe423279b9e9b1409"}}]}, 0x64}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) pidfd_send_signal(r6, 0x3d, &(0x7f0000000480)={0x17, 0x545, 0x3}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r7, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:14 executing program 0: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:14 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:14 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)=0xfffffffffffffcc9) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) preadv(r1, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/191, 0xbf}, {&(0x7f0000000280)=""/162, 0xa2}, {&(0x7f0000000440)=""/216, 0xd8}, {&(0x7f0000000340)=""/145, 0x91}, {&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000540)=""/134, 0x86}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f0000000600)=""/190, 0xbe}], 0x8, 0x1) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:14 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:14 executing program 1: syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x25}, 0x20, 0x0, 0x1, 0x0, 0x400}, 0x20) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r4, r5/1000+30000}}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r3, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r7 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r7, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getpeername(r7, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000280)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:15 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 1: syz_open_procfs(0x0, 0x0) r0 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xfff) 03:39:15 executing program 0: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='ipddp0\x00', 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x9}}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:15 executing program 0: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 2: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) chmod(&(0x7f0000000080)='./file0\x00', 0xa) creat(0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:15 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x9, 0xfffd, 0x6}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x11, 0x2, 0x3, 0x1, 0x0, 0x5, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9dad, 0x6}, 0x52, 0xb76, 0x7ff, 0x0, 0x9, 0x7, 0xe0d}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r7, 0x40084504, &(0x7f00000001c0)=[0x100, 0x3f]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x40000003}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x2, 0x1ff, 0x6163d85b, 0x3f, 0x4, 0x6}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 2: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(r1, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe2ea, 0x2, @perf_bp={0x0, 0xf}, 0x84, 0x4000000000, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 3: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000000c0)={'nat\x00', 0x0, 0x4, 0xea, [], 0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/234}, &(0x7f00000001c0)=0x78) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc7d705e5c534712f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@empty, @in=@dev}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_config_ext={0x40, 0x4}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1d) tkill(r2, 0x23) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:16 executing program 2: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:16 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000040)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 3: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:17 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = socket$inet(0x2, 0x4, 0x1) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@loopback, @multicast2, 0x0, 0x6, [@loopback, @multicast1, @loopback, @remote, @loopback, @loopback]}, 0x28) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0xfffffffffffffffb) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r3 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) sendto$inet(r3, &(0x7f0000000000)="59247fdefbce14b2606b6866782870208f04e3163ceebc0a227ae3e3d08733bcce6398fa7fb6c182bc56360505542ac14ba9808947250fae8eccf60768b208e31694a2b2389eaa120ddf85175481e85e80663ddfb613465b98dd1d6873de8bfa1624e3cba44ed02f17f6fa70dbfd97aa88c40e84297e7a36d59b239c3b037f7654e2d2160a", 0x85, 0x800, &(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10) 03:39:17 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:17 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000040)={0x51, 0x1ff, 0xf14, {0x1ff, 0x1f}, {0x7, 0x3}, @const={0x2, {0x5, 0x81, 0x65c}}}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:17 executing program 3: mlockall(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:17 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x0, 0x900, 0x800, 0x10}) 03:39:17 executing program 1: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff52, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x6) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x0, 0x900, 0x800, 0x10}) 03:39:18 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000100)) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f0000000200)=""/34) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r3, &(0x7f0000000000)="3e176d075c6579b586cf0dff9a640f1881e5bba84db9aebb105aae8ecbacf5a1da9364d0edc1ecd4573ed62a94a56c8a037000aec0a589618ed520b49beb2409c8c878d82d99dc5a84a5cf48504b4a7e0a2a457d0a49e1d79d96", &(0x7f0000000280)=""/197, 0x8}, 0x20) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x0, 0x900, 0x800, 0x10}) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x0, 0x800, 0x10}) 03:39:18 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 2: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x43, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x9}, 0x0, 0x1, r2, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 2: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:18 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x0, 0x800, 0x10}) 03:39:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:18 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = dup3(r3, r4, 0x180000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000000)={0x1, 0x70, 0x7f, 0x80, 0x81, 0x3f, 0x0, 0x20, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xdf2f, 0x80}, 0xf92cd2d3633c078d, 0x9, 0x1f, 0x0, 0x8, 0x2, 0x4}) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:18 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x0, 0x800, 0x10}) 03:39:19 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 2: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x4) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000000)="5dfb7d262f0e60f9ec4c33b4b00b358f0c9e0ef5a2a12e0834e857e96e052b681bf3a8800908d85ee5b369a2e6abbd84f980e02eb1b1f9118f4390709c75ffc8ce05af6c6254f548ee521841129d4b20d5ad94f155a0c6518f2c845bcab0a9ebfdfbde7896704b2bcfeb7bd4235e32d4519783ee820d96385716ec2fa685f32b58f26dbf4d820f3f524292e8b9b2b8cb8d32d2dfcebe48fee993751e8d241faa93", 0xa1}, {&(0x7f0000000c40)="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", 0x1000}], 0x2) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:19 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x0, 0x10}) 03:39:19 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x0, 0x10}) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, &(0x7f0000000c00)=0x1de) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:19 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x0, 0x10}) 03:39:19 executing program 3: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:19 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:19 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800}) 03:39:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@dev, @remote, @broadcast}, &(0x7f0000000040)=0xfffffffffffffdda) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7, 0x6, 0x45, 0x3, 0x3, 0x6, 0x81, 0x1a6, 0x40, 0x1f3, 0x3ff, 0x0, 0x38, 0x2, 0xac, 0x1, 0xe5}, [{0x1, 0x1, 0x0, 0x6, 0x531, 0x5, 0xdff9, 0x1000}], "5f8c36dc51cd3d54cb4b382b85f6d46be42114f8", [[], [], [], [], []]}, 0x58c) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:19 executing program 3: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendmsg$nl_netfilter(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x11, 0x8, 0x2, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0xa}, [@typed={0x8, 0x39, @fd=r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 03:39:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:19 executing program 3: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:19 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:19 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) r4 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) ioctl$sock_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}) r7 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r6, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r7, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40041}, 0x2000c00a) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r7, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r9, &(0x7f0000000a40)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f0000000840)={&(0x7f00000009c0)={0x34, r7, 0x340, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0xfffffffffffffe14, 0x18, {0xf64f, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0xfffffffffffffe35}, 0x1, 0x0, 0x0, 0x4}, 0x44085) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r7, 0x10, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x4000800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:20 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:20 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800}) 03:39:20 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x4000000072439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:20 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800}) 03:39:20 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:20 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x3b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r6, 0x0, r5, 0x0, 0x1000000000000003, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000000c0)={0x4, 0x6}, 0x4) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, r7, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30080402}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0x10c, r7, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xde9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x401}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x71da2778b954bed1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40000001}, 0x40040) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r8, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:20 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10, 0x100000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000000)='veth1_to_team\x00') setsockopt$inet_mreqn(r2, 0x0, 0x4, &(0x7f00000001c0)={@multicast1, @multicast1, r6}, 0xc) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r8, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:20 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:20 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:20 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x180000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0020100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000020}, 0x18005) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:21 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x8000000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="f228d376cdcdf0e5db262e98b7c2558b6ec321ed9bf591b4c4ca4ddaa9708a53529188bf152e921605607a2fa2b08e2f670c0af24b11b61cadc71c8affaf67b09ad304b748c724c2cb35416e7eb77efa97548c543b8af55198309aeebbe36291c10e055039435c894453f31c9a3f26112057734b3e025b04be290016213be066fd9d4c62919170b8eb6058c5d3ff7306f9c1bbb68187395444ef552bbb7f3ff6dd3359", &(0x7f0000000280)=""/160, 0x4}, 0x20) listen(0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:21 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@dev, @remote, @broadcast}, &(0x7f0000000040)=0xfffffffffffffdda) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7, 0x6, 0x45, 0x3, 0x3, 0x6, 0x81, 0x1a6, 0x40, 0x1f3, 0x3ff, 0x0, 0x38, 0x2, 0xac, 0x1, 0xe5}, [{0x1, 0x1, 0x0, 0x6, 0x531, 0x5, 0xdff9, 0x1000}], "5f8c36dc51cd3d54cb4b382b85f6d46be42114f8", [[], [], [], [], []]}, 0x58c) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:21 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) syz_open_pts(r3, 0x80440) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x4) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:21 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:21 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:21 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:21 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:21 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x795}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffff8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}]}]}, 0x50}, 0x1, 0x0, 0x0, 0xc4000}, 0x40) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xdc, r4, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1328}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x82}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) sendmsg(r6, &(0x7f0000000200)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x0, {0xa, 0x4e21, 0x97, @dev={0xfe, 0x80, [], 0x15}, 0x9}}, 0x411, &(0x7f00000001c0)=[{&(0x7f0000000080)="7c20199598712086ac04fb198582ce3fd172f86b12df4717e2b5f1ca4985eed1d8840e638a86ed0aa85fdf17a7e7030a0e7b7282f64ab00bcdd7c2ae24a9a02b5c86884abea964575d78ca4624da86163393cab1a482c3a9e1c441a2be3a49885d594e42069446a75655f3fd5ca4f04ccd312db9c0532a94682db8a8f2371270e0c8a1777c527bb34ec90a4e694f34d97042ffe6b7b74d77933feb9e50294aadb6586241f10239380c063e73a7596e", 0xaf}], 0x1, &(0x7f0000000280)=[{0x58, 0x9b630a5a67ae81fc, 0x200, "7f00ef4a0aa1d06badc42a84defbabe3edd1ec18e0ced4c4a7833e7bcd62a6485c826740335c2721d78a8035637a92c122416ef05d5d715b3cbad4f2f94f1a83b0"}, {0xb0, 0x10c, 0x0, "dbb9919960241d48381174476ffe0531159054333ce9351ae55968b1742a35cfc63fb4c92b55071f86037857a08c1856647901e2dd50e2b8c908a5e92a903f7dc32c3bdf4a976d35afe440aa97c4ec7604d4085333bd6b87a62480e629af6e34552c584541ae35dff9c93ffac65965aa8c3ef2c7c35db2c567d6ce667b0305078e1d0d7c5e0e863cd3a9806149a662185ac5bf2e9d5701b6fe1cd1"}], 0x5e}, 0x20005800) 03:39:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@access={'system_u:object_r:ssh_agent_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4a) [ 481.898433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31858 comm=syz-executor.1 03:39:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) [ 481.959906] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 03:39:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:21 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x18, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, {[@dstopts={0x21, 0x0, [], [@enc_lim, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @hao={0xc9, 0x0, @loopback}, @ra, @enc_lim]}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "96e080", 0x0, "3db41b"}}}}}}}, 0x0) [ 482.059047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=31869 comm=syz-executor.1 03:39:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:21 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:21 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x2000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0xc, 0x4) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_config_ext={0x93b, 0x7}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) setsockopt$inet6_group_source_req(r5, 0x29, 0x2b, &(0x7f0000000280)={0x7, {{0xa, 0x4e24, 0x9, @rand_addr="f5b62f0e0e48e79ec26e19ec8a8a330a", 0x6}}, {{0xa, 0x4e23, 0x6, @mcast1, 0x21fb9442}}}, 0x108) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') [ 482.226437] audit: type=1400 audit(2000000361.880:29): avc: denied { setopt } for pid=31890 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:21 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 03:39:22 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:22 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:22 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') rename(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:39:22 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x1ec, 0x4, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) signalfd4(r3, &(0x7f0000000000)={0x7}, 0x8, 0x800) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:22 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x5, 0x101800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:22 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:22 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:22 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:22 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000000)) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:22 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:22 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') rename(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:39:22 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x2, {0x7, 0x1e, 0x0, 0x2, 0x1ff, 0xfffd, 0xffffffff}}, 0x6c) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000000)={0x2da, 0x6, 0x5, 0x101, 0x4, [{0x1, 0x4, 0x9, 0x0, 0x0, 0x8}, {0x100000000, 0x3, 0x7, 0x0, 0x0, 0x2000}, {0x1, 0x6, 0x6, 0x0, 0x0, 0x440}, {0x1, 0x401, 0x2, 0x0, 0x0, 0x1}]}) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:22 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:23 executing program 1: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0xcdd483c1bf4aabbb, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r0, r1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:23 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:23 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:23 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r6) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x2, 0xb1, 0x246d}) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r7, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace(0x11, r8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:23 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) rt_sigreturn() socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:23 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:23 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r2, &(0x7f0000002f40)=[{{&(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="f0559652d6d01a652b8612fbb97f4d008660b5229a96f1efa6b6ffb43ede7c2437014614fe1661be17645ab1be", 0x2d}], 0x1, &(0x7f0000000280)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @empty, @rand_addr=0x7ff}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0xd0}}, {{&(0x7f0000000200)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000380)="8991e0fc1d632218dc09f19ea2e16601b3986151d6c4fd349dfd738a01c2cc1c80fe29dc27d6fe949182b41e7c3dbe0baf69c3988d6c4aaa0c0d7b186c18eaa309117a340fb9804c8a10f098268862784cc5507b21f5b26655823cc1f059bd8bac9536a7c9517c03db64305cff64612f759e", 0x72}, {&(0x7f0000000440)="bac0f1bdee98f2ae8fc591f716991e739fb7c1aa497f09882a49fbf7831b2c9a7ed3c3abd03c76a3304e92af35734544c5c4a1f121a01c886ce0340c12d30c841d799515a2ad094a3e45b7f8663048335ef9a4cf7a0db4fbbc0e6463a80d7e171a915e5f5202a0ceda145f988cddd48d1f5603b96e6d9c9771b45947f1156966042faab1934a1cde908669bbb3c12a448f4e731863d32244a9f277efe77b8a410554d63cbb7ea4", 0xa7}, {&(0x7f0000000500)="06f04d4f44a8ddb615deddc02432f12842a88164995ba80b2b7ffdb78468ef5cc00a77475ff912dbd114f5a7d7f823418a8b41efaa12487042b1c2a31c412af22db162d3b585188b279f7dd6511fce1d5ee4fa87754a3e4fb98e3be1091b5e0fdea86dde784e715a15a9800e506f962483ec02037cd7bd5f98d4cfccaed35bae9f69a4e084cf0b0db1449e6b7bebf2ff1fee63013b66ddc6c0347284ba5baa4abf6ed837b136ac5c566206060fb3174919888632e6f6e17746373c6f6bc51e9bd61ec8cb4cf590d91e5697ba9c9df4c13785276877a42259c012927577d3041f73041024407c44b4c514401435", 0xed}, {&(0x7f0000000c40)="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", 0x1000}], 0x4, &(0x7f0000000640)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000006c0)="06786854591f5cba360cd04e10e7d0ed0d7a5f393ed9add5fe247c327506ffb1255c12bed368c995ff0fc90555", 0x2d}, {&(0x7f0000000700)="323d06a2bd4328128e78d627", 0xc}, {&(0x7f0000000740)="5a4765d7a55c8583232c7f56e86e7caaacea9de8056fd3b262ebd5e55757eb28f9b5293dce6e534594eb8b5996de7c3690dbfadbc38c482b36c2e63c276c14341014354c2d77ce42e8918309234bf129adfc", 0x52}, {&(0x7f00000007c0)="04a2320af957ad146d4e64d731ef232abf052c5f1d47a4eaed4343f4cf22843d72900d4b7053780fa196e2f7fbb488325c0a3fa7567997af558add6038d39bacc04fec4ec13e2c01e20cb80d395431461a916f57bff569e12bb49263f8765d7b0a4ca3446651ce37f0c167c35053b8f6ac9f1aa687465b18ee1f2ac4092e2457c5701d70e8b31b09874605d15370f63398ab4dc69df366fc8240a0c9cd5d3e5b7df992683f41bf7c848de9e27db78842d09c045c19d589c0b984f060e9bd61dfb8f73d1448a445d7c7478357ab257176d03d480b3fea79d1cb884b84243e4115b88b63c4a4070b7ecc1fb83d3011", 0xee}, {&(0x7f00000008c0)="18638c25a926a0ca0304dc9238ba9422d89f01eaba1a2f3114065198894685edff776a022e6589f2d031d0521702656dc60863814c829631b71dfd1d9a453378f8a257f087075d0df6b204732e3856954dcfc304aeaae0e4f92b3a3c5c80196ab719073ce2c99b9c059ad30a6db07730ef16c7ace3792250cd0c5b3c9d8b48426373bdd278d99b9a6729ea8cac38462d19b380d06276140f49d9f40749fa2fd07673c07e8d77322a2e2c1e9bd6cdaa3c206ffddcc581653fe9ae7c7a7f4d3c7f39e49f4c968c6fa541256b2874b3eb6196631db68c387cfe1fb2f7d95211bafe15b1732119f256bf973591d20a", 0xed}, {&(0x7f00000009c0)="7d12472fbc1ceed8cb3971e037fc157e812163d36e0d6091b52ceb7b36b323c7152af105fcd0e70d1c5e4b416ade171aa6fbcc8040a288acdcc1f1ee808fb659a061623fe785bd741ac9e6fa8fe570b8", 0x50}], 0x6, &(0x7f0000000ac0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xd8}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@end, @cipso={0x86, 0x4b, 0xae, [{0x6, 0x2}, {0x6, 0xc, "470ed1f5d20ea727a4de"}, {0x2, 0x11, "e9f637e900dcccc32e976f7c5d4e34"}, {0xe, 0x10, "887a327c5f259f15df94516cc10a"}, {0x4, 0xf, "e23b6572cc1ce83bab782ff245"}, {0x1, 0x7, "d7fa578822"}]}]}}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002e80)=[{&(0x7f0000000b40)="300d0576bfe06a5f8a7c3ceb6311a4279c29e4bc26fdaad72b1b8699273c227a9dc4698902c83ef65c9e44af3b96b89e2f799407ce1f927a0f10ea60a492ea92ee7a97a9a3037984c0cb7144c78fbc896cfd7d4808a34a970e57bb4370c6176ad02f336c1660f75ff3a2aba14db9b95145c09fed243ca59dfb1c77ff", 0x7c}, {&(0x7f0000001c40)="af80cca5770a5e7d4aeadf30550e65cd7877761e9a00f4547e88c4da201b623e030ad95f3fb0ea6438833306c442c472e9071ad12fe3c593053684c0d08091e7ff1e8490df75c3f452f67ba79f6a18a89571e481d253d86c75", 0x59}, {&(0x7f0000000bc0)="c6b8a448f6c5ca27e66e48bc607299c40116c7452c60d9b645d223434dd7527324136c67f77a252d8a437e203dbbfc", 0x2f}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000002cc0)="4b816dde96e8e83325ba0fdc109f7d1ff8ec6dc6def4ffa39c4ec955f6d3a6cab2e03c7a9f9c864d51d8ec80ccdae6e988fc5515e9d279be7d47d6688e2cbe9e15badac06798223f62494bbcdf3475a04774fc77cc5c5a518ee033d24a9ce20e7486d8d19bd5a6cf86f8faf7d8f5dda747f66666763be3a418affb4cf825f85c98ee0a577112e28152fa1709b6381c19ef411818e29256ae71f6a3e8db9061f8882d397753b53c0444ecb71cf5a27a5c4033bd1156b6596538243f791d0d4fd56c38e0f3b76c8d1f", 0xc8}, {&(0x7f0000002dc0)="af28ca7866bb61c21fb641bd1dd18a8addb52f62d2a471bfef0b925ace42893f35b73753b304a102589a2d560e4cd190a84026e4ea1451aaa41735c4dc7404d5eb13b4684acf35dc2809a9e3a88a66c374aaa0faa3851a34b298cea6c86ac1f1f6ab1f2d00fd571817becc68cd8b1552b75f7e90f4bba5db283c0dc9b9e6ab47a3e74bea5f4fde99bf72af621b27d6d09b08a87c787d53e4095d4f57280fb7ec97d2c9cf684f8e", 0xa7}], 0x6, &(0x7f0000002f00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x37ff8280}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}], 0x30}}], 0x4, 0x200a00c1) r9 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r9, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:23 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') rename(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:39:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:23 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:23 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:24 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) getsockopt(0xffffffffffffffff, 0x2, 0x80000001, &(0x7f0000000540)=""/203, &(0x7f0000000080)=0xcb) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x4, 0x4, 0x7, 0x1}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:24 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:24 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '^em1bdev,-}userposix_acl_accessppp1,em0+\xcctrusted\x00'}, &(0x7f0000000100)='\x00', 0x1, 0x0) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) fsetxattr$security_selinux(r3, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:src_t:s0\x00', 0x1b, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:24 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') rename(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 484.735087] audit: type=1400 audit(2000000364.400:30): avc: denied { associate } for pid=32039 comm="syz-executor.1" name="fuse" dev="devtmpfs" ino=4720 scontext=system_u:object_r:src_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 03:39:24 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:24 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:24 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x30, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000125bd7000fedbdf2500010100000008000200ff0f00000c000900080001000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x44800}, 0x34) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="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") perf_event_open(&(0x7f000001d000)={0x4, 0xfffffffffffffd79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0x4}, 0x28, 0x1) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0x8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@initdev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) splice(r6, 0x0, r5, 0x0, 0x1000000000000003, 0x0) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000280)={0x1ff, 0x7, 0x3, 0x6, 0x7, 0x7f, 0x8, 0x5, 0xfffffff7, 0x7}) 03:39:24 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:24 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) socket$inet(0x2, 0xca21f56334111fa9, 0x6f) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp], 0x1) ioctl$KDSKBLED(r0, 0x4b65, 0x8) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000040)={0x80000001, 0x6, 0x26e0, 0x7fff, 0x7, 0x2}) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') rename(&(0x7f0000000380)='./file1/file0\x00', &(0x7f0000000040)='./file0\x00') 03:39:25 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:25 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:25 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$FUSE_STATFS(r2, &(0x7f0000000000)={0x60, 0x0, 0x5, {{0x9, 0x6, 0x800, 0x101, 0x6, 0x0, 0x2, 0x9}}}, 0x60) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000080)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:25 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x7}}, 0x18) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:25 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:25 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:25 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') 03:39:25 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:25 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x200}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x3f, 0x1001, 0x80) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000000c0)={'netdevsim0\x00', 0x9}) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) flock(r3, 0xf) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80600, 0x0) write$uinput_user_dev(r5, &(0x7f0000000780)={'syz1\x00', {0xfff, 0x7fff, 0x3, 0x401}, 0x54, [0x8, 0x20, 0xf6f, 0x80, 0x200, 0x2, 0x3ff, 0x8, 0x0, 0x9, 0xfffffff7, 0x4, 0x5, 0x400, 0x5, 0x20, 0x2, 0x9e, 0xebee, 0x7, 0x3, 0x8, 0xffffffff, 0x8001, 0x7, 0x1000, 0x1, 0x0, 0x8, 0x0, 0x2, 0x26a, 0x1, 0x80, 0x6, 0x6, 0x5, 0x3, 0x3, 0x3, 0x2, 0x7fffffff, 0x5, 0x80000000, 0x6e, 0x37f, 0xffffffff, 0x92, 0x6, 0x2, 0x400, 0xfffffffb, 0x200, 0x7fff, 0xffc7, 0x10000, 0x2, 0x1, 0x2, 0x9, 0x6, 0x8001, 0x7f, 0x3], [0x6, 0x5, 0x4, 0x7, 0x401, 0x401, 0x7fffffff, 0x9, 0x7, 0x18, 0x3ff, 0x10000, 0x200, 0x9, 0x7, 0x5, 0x200, 0x7, 0x1, 0xffffffa1, 0x6, 0x800000, 0x10000, 0x800, 0x80, 0x40, 0x0, 0x5, 0x7fff, 0x9, 0x1, 0x10001, 0x7, 0x2, 0x6, 0x200, 0x81, 0xfffffe00, 0x2d1d69a8, 0x8, 0x4, 0x81, 0xd, 0x480, 0x6, 0x20, 0x160, 0x1, 0x3, 0x7fff, 0x80000001, 0x3, 0x4, 0x4, 0x8, 0x0, 0x6, 0x0, 0x8, 0x9, 0x10001, 0xb4f, 0xfffffff9, 0x800], [0xde, 0x5, 0x7f5, 0x8101, 0xe8, 0x68b0, 0x7, 0x4, 0x1f, 0xfffffff1, 0xfffffffe, 0x8, 0x79e, 0x5, 0x3108dfa1, 0x3, 0x0, 0xfffffff7, 0xfffffff7, 0x4, 0xfffffffb, 0x18b, 0xa89, 0x4, 0xffffff00, 0x1ff, 0x7, 0x2, 0x80, 0x5, 0x6, 0x1, 0x7, 0x7ff, 0x401, 0x80, 0x4d, 0x4, 0x0, 0x5, 0xfff, 0x94ce, 0x1, 0xffffffff, 0x9, 0x7, 0x5, 0x2, 0x2, 0x5, 0x7ff, 0xd2f, 0x3f, 0x9, 0x7, 0xffff8001, 0x81, 0x3, 0x6, 0x8, 0x2, 0x8, 0xffff, 0x7fffffff], [0x2, 0x20, 0x80, 0x4ef7f3a, 0xff, 0x288, 0x1, 0x9, 0x0, 0xeda9, 0x1, 0x401, 0xfff, 0x612, 0x374, 0x4, 0x8000, 0x2, 0x2, 0x9, 0x6, 0x7f, 0x6, 0xfff, 0x3ff, 0x1a0b, 0x7, 0x401, 0x101, 0xc05, 0x6, 0x9, 0x8001, 0x9, 0x8, 0x6, 0xc4f, 0x2, 0x4, 0x8, 0x9, 0xffff, 0x6, 0x101, 0x4, 0x7ff, 0x6, 0x0, 0x8, 0xa5, 0x1, 0x7, 0x311e, 0x7, 0x7, 0x2, 0x19, 0x47, 0x200, 0x2, 0x1, 0x7, 0x2, 0x40]}, 0x45c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:25 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:26 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:26 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:26 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:26 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='./file1/file0\x00') 03:39:26 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:26 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:26 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:26 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000), 0x800) 03:39:27 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:27 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:27 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:27 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') clone(0x8000000000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:39:27 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:27 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:28 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:28 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:28 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') 03:39:28 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:28 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:28 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:28 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:28 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x6d68201f7e4dca69, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000100)={{0x4, 0x0, @reserved="13faaf1576069ffb7b9252bde86e4d972041b599b0b8be48055f7ad4f6506f4e"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x4, 0xfffffffffffffec0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x32020, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r5, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r8, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r4, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r2, 0x0, 0x1, &(0x7f00000001c0)='\x00', r9}, 0x30) capset(&(0x7f00000003c0)={0x20080522, r10}, &(0x7f0000000440)={0x6, 0x5, 0x7bd, 0x1f, 0x7, 0xa}) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r11 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r11, 0x5422) sendfile(r1, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(&(0x7f0000000000)='.\x00', 0x28) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r12 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r12, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) 03:39:29 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:29 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1e0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@rand_addr, @rand_addr, @local}, &(0x7f00000001c0)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:29 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:29 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) 03:39:29 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x200}, 0x400, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:29 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:29 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xffffffffffff8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) syz_open_pts(r3, 0x80440) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000001c0)={0x1, {0x618, 0x10001, 0x400, 0x10000, 0x3, 0x1}}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)=""/236) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e25, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000100)={0x94, 0xe609}) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:29 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:29 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) syz_open_pts(r1, 0x80440) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x81, 0x3f, 0x9}) syz_open_procfs(0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x271}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4d60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r8, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r8, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r8, 0x0, r7, 0x0, 0x1000000000000003, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r7, 0x29, 0x2d, &(0x7f0000000280)={0x6, {{0xa, 0x4e24, 0x80000001, @rand_addr="3cf5130713d3580784db339c6024462c", 0x9}}}, 0x88) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r6, 0x0, r5, 0x0, 0x1000000000000003, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) sendfile(r3, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:29 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:29 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) openat$zero(0xffffffffffffff9c, 0x0, 0x3907ef94e20b276f, 0x0) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = creat(0x0, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x3, &(0x7f0000000000)={@multicast2, @initdev, @broadcast}, &(0x7f0000000040)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:30 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x482c80) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000100)) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0xe6) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:30 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x80000001}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x800, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6772cb4f6f74705f69", @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB="2c726f6f74303030413030c73030302c75736501006964f06e000000edff00000000000000000000000000000000000000000000000016d9cb29e5d06081c92b23680d6aafd41eae891f2953701ad7f0313ced347d697f59edba2de560d4ea79b3eef2fe5b764b1d2a2c1062212a0b77ca367774a5ff90aa7e6a61fee35a7c852181c6fd9622b2a1cf2c77e7", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r8, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r9, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r9, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r10, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r10, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r11, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r11, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r12, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r12, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r13 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r13, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r13, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r13, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r14 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r14, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r14, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r14, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r15 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r15, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r15, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r15, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r16 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r16, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r16, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r16, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000600)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRES32=r14, @ANYRES16=r15, @ANYRES32, @ANYRES16=r16, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYPTR, @ANYRESDEC=r2, @ANYRES64=r0, @ANYPTR, @ANYRES32=r13]], @ANYRESHEX=r7, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES32, @ANYBLOB=',groupyid=', @ANYRESDEC=0x0]) preadv(r7, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r7, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r17 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r18 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r18, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r18, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r18, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64, @ANYRESHEX=r17, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES16=r18, @ANYBLOB="2e67756f75705fe3643d", @ANYRESDEC=0x0]) preadv(r17, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r17, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES32=r6, @ANYRESDEC, @ANYBLOB="35e34e6a7181db5cd93cbe558e05eecbf6da97055fb2450e356107ed3668f0949ce9b5682d9f124069d330fb65f67c02f31ac317105a7a79e5fcb0f6fa60d290e29bdca60fa0ea447f0f136abde8871a299f472c387ef7fc4a465dc7fb57ef32cf430df2edd1099fd20d0786f1e42d8761fc86f105d69b17aa277f5091606f893ec96d7ccfb6e8b75cb2cedba1518335e4ca18d88b2fff1bb314c57ba875b8bd97bcbd91438c760d8c138c1bb3dbe5ceb1ad6711b39427543b51301dadac90f457841dd096a8", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRES16=0x0, @ANYRESOCT=r7], @ANYRES32=r17], @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendfile(r1, r4, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:30 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:30 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:30 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x3, 0x3, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2043, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1d) getpgrp(r4) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) [ 491.391682] audit: type=1400 audit(2000000371.040:31): avc: denied { write } for pid=32394 comm="syz-executor.1" name="net" dev="proc" ino=113149 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) [ 491.514381] audit: type=1400 audit(2000000371.160:32): avc: denied { add_name } for pid=32394 comm="syz-executor.1" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 491.616819] audit: type=1400 audit(2000000371.270:33): avc: denied { create } for pid=32394 comm="syz-executor.1" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 03:39:31 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:31 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:31 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:31 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x38a4ba3c2167770a, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:31 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="ac1e0001000000000000000000000000000004d62b000000000000000000000000000000000000011f000000000000000080000000000000000000000000000002b164290000000001010000000000000500000000000000020000000000000006000000000000000000000000000000070000000000000000000080ffffffffff0f00000000000006000000ffff00000600000027bd7000013500000a000620b40000000000000007000000080000003400080030000800010128004e49eece5f7e5b4adcafc9f7595092058eb83986a6f2f8f4ce70912edb51088e0788a208181f0593e4000600fe80000000000000000000000000001dff0100000000000000000000000000014e2400094e240000140020200000000064445447b5847b4056f5e819df056e331b3912b7ac1c980e8e8cdebcb6477219538e52eb061faa8fa8677ebc059609d12041abf46f48335c0670ad25b25f15cc82273c95a88b8ebdef0750cb8d833a3c7832236bfb5f80cc07b62c1bab834eb6b4c2c69451e488ec888be1dbf41a0769e2462431d3e5f6d1cc0e39e473748c97242c0bc78df0d3c789c05dad2dbf3695da5c52b768ee7eb13c67860ac5e1a4409799bd7bfc63e63edc40a2c847f450bd29ee780c358a2b68cd93399265bfdfada513c9b224842da7b8c72b3943ce85cce5eae5bd", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r8 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r8, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:31 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:31 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:32 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400, 0x121) read(r3, &(0x7f0000000040)=""/177, 0xb1) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:32 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:32 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:32 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) flock(r2, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) clock_adjtime(0x3, &(0x7f0000000540)={0x50, 0x6, 0xfffffffffffffffb, 0x0, 0xcc36, 0x4, 0x610e, 0x7ff, 0xec, 0x0, 0xffffffffffffff80, 0xff, 0x20, 0x8, 0x7, 0x0, 0x22, 0x1f, 0x8001, 0x35, 0x0, 0xff, 0x7, 0x8c, 0x1, 0x6}) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast2, @in6=@local, 0x4e22, 0xfffa, 0x4e20, 0x4, 0x2, 0xa0, 0x20, 0x87, 0x0, r5}, {0x9, 0x5b9a, 0x0, 0x5, 0x7, 0x7f, 0xffffffff, 0xbb}, {0x7c000, 0x6ad, 0x80000001, 0x7}, 0x1, 0x6e6bb8, 0x2, 0x0, 0x4, 0x3}, {{@in6=@empty, 0x4d6, 0x33}, 0x2, @in6=@remote, 0x3500, 0x1, 0xd938811452642513, 0x2, 0x3b, 0x0, 0x4}}, 0xe8) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000000c0)={0x5, 0x7, 0x1, 0x20, 0x5df4}) 03:39:32 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x0, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:32 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000040)={{0x3, 0x0, @reserved="46f35d6569166a2f7301a39c6e882d7d83b26706581b51c4ebe95d188e9bca1a"}}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000280)="faf6794a07554635f1294fd5797737735083908e3b9f8d096a75d089f284f3d5f72f1e4cd318c9a45c542b1ec3e0be0e85a211eccbc35442215bc3024100c47ff54fce411fdd5a81cc0b76bc18438f159271fa3a8cbb34c3cc8d7f025273613fc306c547208417063d030dab71483dc2d4b47008b3c4ff187eda5dbcd137ec238599e212e4f1cef578ca4dd19c74548706e9733d617209b49d500ba8b5faeec809bf481eb3d222aa8c94967531ee93cb0d0cbd622569bef15a4e570ee3f9d34879bd8a6ed25e608ec7d210154e84476ff2a9306625cbbb1d6e0438179ff6bc7af21593e732faebe8ea090be3365d86d22eef2b9f4d62497e15893611607977cb") 03:39:32 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:32 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x0, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:32 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:32 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:32 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:32 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:32 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x0, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:32 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x4000000000002, 0xffffffffffffffff, 0x13) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:32 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:33 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:33 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs(r2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:33 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:33 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:33 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:33 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:33 executing program 1: gettid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1d) r1 = syz_open_procfs(r0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x4048, 0x1, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) sendfile(r4, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = dup3(r1, r3, 0x180000) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r8, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r8, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r8, 0x0, r7, 0x0, 0x1000000000000003, 0x0) getdents64(r7, &(0x7f0000000c40)=""/4096, 0x1000) fsetxattr$security_smack_transmute(r6, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0xacfd3c0e43c3ec9e) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x1c7f1fd, 0x0, 0x0) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x16) 03:39:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:33 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 03:39:34 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:34 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0x0) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:34 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 03:39:34 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB="001004000000fb7b51c889038279a45a3d079600e0"], 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) mount(&(0x7f0000000640)=@sr0='/dev/sr0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='openpromfs\x00', 0x20, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='p^\xe0g \x02a\x00') ioctl$PPPIOCDISCONN(r1, 0x7439) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='.dead\x00', 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) 03:39:34 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:34 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:34 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 03:39:34 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:34 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) 03:39:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="05030e0006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) [ 495.232244] EXT4-fs (sda1): re-mounted. Opts: (null) [ 495.273486] EXT4-fs (sda1): re-mounted. Opts: (null) 03:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r2, 0x1) getpid() open(0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 03:39:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x42, &(0x7f00000000c0)={@rand_addr="a336a14a80e5f98d9b0db2785b4bb500"}, 0x2bf) 03:39:35 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:35 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:35 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:35 executing program 5: pipe(&(0x7f0000000140)) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:39:35 executing program 1: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:36 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:36 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:36 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:36 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:36 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:36 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:36 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:37 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:37 executing program 5: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:37 executing program 5: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:37 executing program 5: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 1: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:41 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:41 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:41 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:41 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:41 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) flock(r2, 0x2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) clock_adjtime(0x3, &(0x7f0000000540)={0x50, 0x6, 0xfffffffffffffffb, 0x0, 0xcc36, 0x4, 0x610e, 0x7ff, 0xec, 0x0, 0xffffffffffffff80, 0xff, 0x20, 0x8, 0x7, 0x0, 0x22, 0x1f, 0x8001, 0x35, 0x0, 0xff, 0x7, 0x8c, 0x1, 0x6}) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast2, @in6=@local, 0x4e22, 0xfffa, 0x4e20, 0x4, 0x2, 0xa0, 0x20, 0x87, 0x0, r5}, {0x9, 0x5b9a, 0x0, 0x5, 0x7, 0x7f, 0xffffffff, 0xbb}, {0x7c000, 0x6ad, 0x80000001, 0x7}, 0x1, 0x6e6bb8, 0x2, 0x0, 0x4, 0x3}, {{@in6=@empty, 0x4d6, 0x33}, 0x2, @in6=@remote, 0x3500, 0x1, 0xd938811452642513, 0x2, 0x3b, 0x0, 0x4}}, 0xe8) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000000c0)={0x5, 0x7, 0x1, 0x20, 0x5df4}) 03:39:41 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:41 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:42 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x482c80) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000100)) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0xe6) 03:39:42 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1e0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@rand_addr, @rand_addr, @local}, &(0x7f00000001c0)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:42 executing program 1: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x1e0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@rand_addr, @rand_addr, @local}, &(0x7f00000001c0)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:42 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(0xffffffffffffffff, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:42 executing program 1: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:42 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:43 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:43 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:43 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '^em1bdev,-}userposix_acl_accessppp1,em0+\xcctrusted\x00'}, &(0x7f0000000100)='\x00', 0x1, 0x0) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) fsetxattr$security_selinux(r3, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:src_t:s0\x00', 0x1b, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:43 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="ac1e0001000000000000000000000000000004d62b000000000000000000000000000000000000011f000000000000000080000000000000000000000000000002b164290000000001010000000000000500000000000000020000000000000006000000000000000000000000000000070000000000000000000080ffffffffff0f00000000000006000000ffff00000600000027bd7000013500000a000620b40000000000000007000000080000003400080030000800010128004e49eece5f7e5b4adcafc9f7595092058eb83986a6f2f8f4ce70912edb51088e0788a208181f0593e4000600fe80000000000000000000000000001dff0100000000000000000000000000014e2400094e240000140020200000000064445447b5847b4056f5e819df056e331b3912b7ac1c980e8e8cdebcb6477219538e52eb061faa8fa8677ebc059609d12041abf46f48335c0670ad25b25f15cc82273c95a88b8ebdef0750cb8d833a3c7832236bfb5f80cc07b62c1bab834eb6b4c2c69451e488ec888be1dbf41a0769e2462431d3e5f6d1cc0e39e473748c97242c0bc78df0d3c789c05dad2dbf3695da5c52b768ee7eb13c67860ac5e1a4409799bd7bfc63e63edc40a2c847f450bd29ee780c358a2b68cd93399265bfdfada513c9b224842da7b8c72b3943ce85cce5eae5bd", @ANYRES32, @ANYRES32=r7, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r2, &(0x7f0000002f40)=[{{&(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="f0559652d6d01a652b8612fbb97f4d008660b5229a96f1efa6b6ffb43ede7c2437014614fe1661be17645ab1be", 0x2d}], 0x1, &(0x7f0000000280)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @empty, @rand_addr=0x7ff}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0xd0}}, {{&(0x7f0000000200)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000380)="8991e0fc1d632218dc09f19ea2e16601b3986151d6c4fd349dfd738a01c2cc1c80fe29dc27d6fe949182b41e7c3dbe0baf69c3988d6c4aaa0c0d7b186c18eaa309117a340fb9804c8a10f098268862784cc5507b21f5b26655823cc1f059bd8bac9536a7c9517c03db64305cff64612f759e", 0x72}, {&(0x7f0000000440)="bac0f1bdee98f2ae8fc591f716991e739fb7c1aa497f09882a49fbf7831b2c9a7ed3c3abd03c76a3304e92af35734544c5c4a1f121a01c886ce0340c12d30c841d799515a2ad094a3e45b7f8663048335ef9a4cf7a0db4fbbc0e6463a80d7e171a915e5f5202a0ceda145f988cddd48d1f5603b96e6d9c9771b45947f1156966042faab1934a1cde908669bbb3c12a448f4e731863d32244a9f277efe77b8a410554d63cbb7ea4", 0xa7}, {&(0x7f0000000500)="06f04d4f44a8ddb615deddc02432f12842a88164995ba80b2b7ffdb78468ef5cc00a77475ff912dbd114f5a7d7f823418a8b41efaa12487042b1c2a31c412af22db162d3b585188b279f7dd6511fce1d5ee4fa87754a3e4fb98e3be1091b5e0fdea86dde784e715a15a9800e506f962483ec02037cd7bd5f98d4cfccaed35bae9f69a4e084cf0b0db1449e6b7bebf2ff1fee63013b66ddc6c0347284ba5baa4abf6ed837b136ac5c566206060fb3174919888632e6f6e17746373c6f6bc51e9bd61ec8cb4cf590d91e5697ba9c9df4c13785276877a42259c012927577d3041f73041024407c44b4c514401435", 0xed}, {&(0x7f0000000c40)="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", 0x1000}], 0x4, &(0x7f0000000640)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000006c0)="06786854591f5cba360cd04e10e7d0ed0d7a5f393ed9add5fe247c327506ffb1255c12bed368c995ff0fc90555", 0x2d}, {&(0x7f0000000700)="323d06a2bd4328128e78d627", 0xc}, {&(0x7f0000000740)="5a4765d7a55c8583232c7f56e86e7caaacea9de8056fd3b262ebd5e55757eb28f9b5293dce6e534594eb8b5996de7c3690dbfadbc38c482b36c2e63c276c14341014354c2d77ce42e8918309234bf129adfc", 0x52}, {&(0x7f00000007c0)="04a2320af957ad146d4e64d731ef232abf052c5f1d47a4eaed4343f4cf22843d72900d4b7053780fa196e2f7fbb488325c0a3fa7567997af558add6038d39bacc04fec4ec13e2c01e20cb80d395431461a916f57bff569e12bb49263f8765d7b0a4ca3446651ce37f0c167c35053b8f6ac9f1aa687465b18ee1f2ac4092e2457c5701d70e8b31b09874605d15370f63398ab4dc69df366fc8240a0c9cd5d3e5b7df992683f41bf7c848de9e27db78842d09c045c19d589c0b984f060e9bd61dfb8f73d1448a445d7c7478357ab257176d03d480b3fea79d1cb884b84243e4115b88b63c4a4070b7ecc1fb83d3011", 0xee}, {&(0x7f00000008c0)="18638c25a926a0ca0304dc9238ba9422d89f01eaba1a2f3114065198894685edff776a022e6589f2d031d0521702656dc60863814c829631b71dfd1d9a453378f8a257f087075d0df6b204732e3856954dcfc304aeaae0e4f92b3a3c5c80196ab719073ce2c99b9c059ad30a6db07730ef16c7ace3792250cd0c5b3c9d8b48426373bdd278d99b9a6729ea8cac38462d19b380d06276140f49d9f40749fa2fd07673c07e8d77322a2e2c1e9bd6cdaa3c206ffddcc581653fe9ae7c7a7f4d3c7f39e49f4c968c6fa541256b2874b3eb6196631db68c387cfe1fb2f7d95211bafe15b1732119f256bf973591d20a", 0xed}, {&(0x7f00000009c0)="7d12472fbc1ceed8cb3971e037fc157e812163d36e0d6091b52ceb7b36b323c7152af105fcd0e70d1c5e4b416ade171aa6fbcc8040a288acdcc1f1ee808fb659a061623fe785bd741ac9e6fa8fe570b8", 0x50}], 0x6, &(0x7f0000000ac0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xd8}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@end, @cipso={0x86, 0x4b, 0xae, [{0x6, 0x2}, {0x6, 0xc, "470ed1f5d20ea727a4de"}, {0x2, 0x11, "e9f637e900dcccc32e976f7c5d4e34"}, {0xe, 0x10, "887a327c5f259f15df94516cc10a"}, {0x4, 0xf, "e23b6572cc1ce83bab782ff245"}, {0x1, 0x7, "d7fa578822"}]}]}}}], 0x78}}, {{0x0, 0x0, &(0x7f0000002e80)=[{&(0x7f0000000b40)="300d0576bfe06a5f8a7c3ceb6311a4279c29e4bc26fdaad72b1b8699273c227a9dc4698902c83ef65c9e44af3b96b89e2f799407ce1f927a0f10ea60a492ea92ee7a97a9a3037984c0cb7144c78fbc896cfd7d4808a34a970e57bb4370c6176ad02f336c1660f75ff3a2aba14db9b95145c09fed243ca59dfb1c77ff", 0x7c}, {&(0x7f0000001c40)="af80cca5770a5e7d4aeadf30550e65cd7877761e9a00f4547e88c4da201b623e030ad95f3fb0ea6438833306c442c472e9071ad12fe3c593053684c0d08091e7ff1e8490df75c3f452f67ba79f6a18a89571e481d253d86c75", 0x59}, {&(0x7f0000000bc0)="c6b8a448f6c5ca27e66e48bc607299c40116c7452c60d9b645d223434dd7527324136c67f77a252d8a437e203dbbfc", 0x2f}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000002cc0)="4b816dde96e8e83325ba0fdc109f7d1ff8ec6dc6def4ffa39c4ec955f6d3a6cab2e03c7a9f9c864d51d8ec80ccdae6e988fc5515e9d279be7d47d6688e2cbe9e15badac06798223f62494bbcdf3475a04774fc77cc5c5a518ee033d24a9ce20e7486d8d19bd5a6cf86f8faf7d8f5dda747f66666763be3a418affb4cf825f85c98ee0a577112e28152fa1709b6381c19ef411818e29256ae71f6a3e8db9061f8882d397753b53c0444ecb71cf5a27a5c4033bd1156b6596538243f791d0d4fd56c38e0f3b76c8d1f", 0xc8}, {&(0x7f0000002dc0)="af28ca7866bb61c21fb641bd1dd18a8addb52f62d2a471bfef0b925ace42893f35b73753b304a102589a2d560e4cd190a84026e4ea1451aaa41735c4dc7404d5eb13b4684acf35dc2809a9e3a88a66c374aaa0faa3851a34b298cea6c86ac1f1f6ab1f2d00fd571817becc68cd8b1552b75f7e90f4bba5db283c0dc9b9e6ab47a3e74bea5f4fde99bf72af621b27d6d09b08a87c787d53e4095d4f57280fb7ec97d2c9cf684f8e", 0xa7}], 0x6, &(0x7f0000002f00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x37ff8280}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}], 0x30}}], 0x4, 0x200a00c1) r9 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r9, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:43 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r6) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x2, 0xb1, 0x246d}) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r7, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace(0x11, r8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r0, 0xffffffffffffffff, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:44 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:44 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:44 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:44 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:44 executing program 1: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:44 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:44 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:44 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:46 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:46 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:46 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10}) 03:39:46 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:46 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10}) 03:39:46 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10}) 03:39:46 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 1: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 5: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x0, 0x900, 0x800, 0x10}) 03:39:47 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10}) 03:39:47 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = dup3(r3, r4, 0x180000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000000)={0x1, 0x70, 0x7f, 0x80, 0x81, 0x3f, 0x0, 0x20, 0x80000, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xdf2f, 0x80}, 0xf92cd2d3633c078d, 0x9, 0x1f, 0x0, 0x8, 0x2, 0x4}) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:47 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 5: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10}) 03:39:47 executing program 1: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:47 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x0, 0x900, 0x800, 0x10}) 03:39:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:47 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:48 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:48 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:48 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x0, 0x800, 0x10}) 03:39:48 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:48 executing program 1: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:48 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x9, 0xfffd, 0x6}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x11, 0x2, 0x3, 0x1, 0x0, 0x5, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9dad, 0x6}, 0x52, 0xb76, 0x7ff, 0x0, 0x9, 0x7, 0xe0d}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r7, 0x40084504, &(0x7f00000001c0)=[0x100, 0x3f]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x40000003}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x2, 0x1ff, 0x6163d85b, 0x3f, 0x4, 0x6}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:48 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:48 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10}) 03:39:48 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:48 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10}) 03:39:48 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x9, 0xfffd, 0x6}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x11, 0x2, 0x3, 0x1, 0x0, 0x5, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9dad, 0x6}, 0x52, 0xb76, 0x7ff, 0x0, 0x9, 0x7, 0xe0d}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r7, 0x40084504, &(0x7f00000001c0)=[0x100, 0x3f]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x40000003}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x2, 0x1ff, 0x6163d85b, 0x3f, 0x4, 0x6}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:48 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10}) 03:39:48 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:48 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800}) 03:39:48 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x9, 0xfffd, 0x6}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x11, 0x2, 0x3, 0x1, 0x0, 0x5, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9dad, 0x6}, 0x52, 0xb76, 0x7ff, 0x0, 0x9, 0x7, 0xe0d}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r7, 0x40084504, &(0x7f00000001c0)=[0x100, 0x3f]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x40000003}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x2, 0x1ff, 0x6163d85b, 0x3f, 0x4, 0x6}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:48 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:48 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) chmod(&(0x7f0000000080)='./file0\x00', 0xa) creat(0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:49 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800}) 03:39:49 executing program 4: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800}) 03:39:49 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getpeername(r2, &(0x7f0000000040)=@isdn, &(0x7f00000000c0)=0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x9, 0xfffd, 0x6}}, 0x50) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r5 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000280)={0x1, 0x70, 0x11, 0x2, 0x3, 0x1, 0x0, 0x5, 0x2, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9dad, 0x6}, 0x52, 0xb76, 0x7ff, 0x0, 0x9, 0x7, 0xe0d}) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r7, 0x40084504, &(0x7f00000001c0)=[0x100, 0x3f]) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x40000003}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000100)={0x2, 0x1ff, 0x6163d85b, 0x3f, 0x4, 0x6}) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:49 executing program 4: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:49 executing program 0: syz_open_procfs(0x0, 0x0) r0 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xfff) 03:39:51 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 0: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:51 executing program 1: mlockall(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={0x0}, 0x0, 0x542, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@mpls_newroute={0x64, 0x18, 0x0, 0x70bd2d, 0x25dfdbfb, {0x1c, 0x80, 0x30, 0x5e, 0xfd, 0x2, 0xff, 0x9, 0x800}, [@RTA_MULTIPATH={0xc, 0x9, {0x8001, 0x3, 0x9b, r3}}, @RTA_MULTIPATH={0xc, 0x9, {0xb211, 0x6, 0x9, r4}}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x7f}, @RTA_VIA={0x14, 0x12, {0x10, "dcb4dfe0a1b2a3cd914765bd035b"}}, @RTA_VIA={0x14, 0x12, {0xa, "59b41d3109efe423279b9e9b1409"}}]}, 0x64}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) pidfd_send_signal(r6, 0x3d, &(0x7f0000000480)={0x17, 0x545, 0x3}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r7, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:51 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:51 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:51 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x4, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x7, 0x7, 0x1, 0x800}, 0x10) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000000)=""/95, 0x401}) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:51 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000340)='posix_acl_access*\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r2, 0x35, 0x35e}, &(0x7f0000000680)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000740)="c191d54428e32b413affbe0ce9549505cf224be679783ace910c52c9e720c8509e07c042e9697a46664c2b62961407273734c03633", &(0x7f0000000300)=""/24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x1, 0x3, 0x10000, 0x1, 0x0, 0x0, 0x1}, 0x34e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r8, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendmsg$nl_xfrm(r4, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r6, @ANYRES32=r3, @ANYBLOB="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", @ANYRES32, @ANYRES32=r7, @ANYRES16=r8, @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0x4, r2, r3, r9) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r10 = socket(0x10, 0x2, 0x0) r11 = syz_open_procfs(0x0, 0x0) sendfile(r10, r11, 0x0, 0x80000002) syz_open_pts(r11, 0x80440) readlinkat(r11, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=""/93, 0x5d) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r12 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) ioctl$TIOCNOTTY(r12, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r13 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400400, 0x0) ioctl$KDGETMODE(r13, 0x4b3b, &(0x7f00000000c0)) creat(0x0, 0x0) 03:39:52 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:52 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:52 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="964535373707366f896f678aa7d407cb", 0x10) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:52 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:52 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:52 executing program 5: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x18700, 0x0) r3 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="964535373707366f896f678aa7d407cb", 0x10) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 03:39:52 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:52 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x00\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x0, 0x10, r0}) 03:39:52 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:52 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:52 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x3f, 0x900, 0x800, 0x10}) 03:39:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:52 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:52 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:52 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:52 executing program 5: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:53 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) flistxattr(r2, &(0x7f0000000100)=""/4096, 0x1000) 03:39:53 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x1, 0x6, 0x8}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:53 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000001c0)="31dd88e9cb2fda5852930f09f51afbe4e939e0d5ef3d9d3035a34df216c11036d92c9499f804f8e11639f21dd07870b45a0aaf2b6197f32728def41609a2de42780ff0dda1eba7a9031ddf0dd36c5a4176ea2c677264fe6167b6", 0xfde4) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x1000) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000040)) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r9, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r8, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r10, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32, @ANYRES32=r11, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10, r10}) 03:39:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getown(r0, 0x9) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:53 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:53 executing program 1: syz_open_procfs(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='asymmetric\x00\xddd\xadR\xcd\xf0\x9ac=,\x814\xe9\xd1*c\f:\xe2p\x96\x0e<\x80\aY\xed@\x8f/\x0f\xedDVQ\xac\t\x8d\xbf\x91\xa2b]IG\xc1\x87r\xb0\xd69\xb1\xbdar\x83k\x0f\xa1Uj\xa0\xc6\x0e\xb3u\r\xaa\xad\xab\x7f4\f(\xea\xd2\xcc\a\x1f\x9a#\xa3#U\"\xa6\xf38\x80}\b\xdfE|\x12\xf5F\xd0F\xc45\x9b[\xa1D`I\xd4+\x1el\xb1k\x1c\xd9\x82\xa9B\xef\xbb\xf4\'%\xef\xb6\xfa\xcd\xd6O\x85B\xb5\xd4;\x93)\x8d\x85\xce]\x9d\xcb\xc3\xe5J\x16\x88\xd2!Rf+v2[\xef\x18\xc4\xacG9\x13\xcaa6\xaf4CH9\xf0\x99i\x05\xe0uFR3\a\x04\x9e$T\x80U\xcf\x94\xcf\x14^\xfc\xb7', 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000340)='/selinux/poli\xec\x13\rA\x9e\xd7j\x8e\xcbo\xccb\xf0@^\x86t$\x87\x10]\xf3\x9d\x81\xda\x03R\x9b{\xf4\t\xaa\x83\xfa/\xfb{\xc5{\x01~\xe0,hhw\xdd\xd0\x83\xc7\x13\xb9\xf3G\x00'/80) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000580)=""/170) r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000044c0)=[{{&(0x7f00000001c0)=@rc, 0x80, &(0x7f0000000240)=[{&(0x7f0000000640)=""/144, 0x90}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000000700)=""/88, 0x58}], 0x3, &(0x7f0000000780)=""/186, 0xba}, 0x39}, {{&(0x7f0000000840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x2, &(0x7f00000028c0)=""/247, 0xf7}, 0x396}, {{&(0x7f00000029c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000004000)=[{&(0x7f0000002a40)=""/89, 0x59}, {&(0x7f0000002ac0)=""/171, 0xab}, {&(0x7f0000002b80)=""/212, 0xd4}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/209, 0xd1}, {&(0x7f0000003d80)=""/158, 0x9e}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000003e40)=""/213, 0xd5}, {&(0x7f0000003f40)=""/180, 0xb4}, {&(0x7f0000000440)=""/21, 0x15}], 0xa}, 0x1}, {{&(0x7f00000040c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000004280)=[{&(0x7f0000004140)=""/222, 0xde}, {&(0x7f0000004240)=""/37, 0x25}], 0xffffffffffffe26, &(0x7f00000042c0)=""/88, 0x58}, 0x2}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000004340)=""/149, 0x95}], 0x1, &(0x7f0000004440)=""/69, 0x45}, 0x3}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0xbc}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x10, 0x3}, 0x0) open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f000002eff0)={0x39, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x39, &(0x7f0000000000)=[{}]}, 0x10) 03:39:53 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000040)=""/104, 0x68}, {&(0x7f00000000c0)=""/5, 0x5}], 0x3, 0x100) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:53 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x3b52ba51f0fb05c6}, 0x20) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) [ 514.198438] devpts: called with bogus options 03:39:54 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:54 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8000, @mcast2, 0x583}, 0x1c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:54 executing program 4: mlockall(0x5c6135b54918aba0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='vboxnet0eth1$-\\wlan0wlan0self+-proc\x00', 0x358, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) exit_group(0x5) sendfile(r1, r0, 0x0, 0x7ffff000) 03:39:54 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_getscheduler(r3) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000080)=0xff, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x100}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r6, 0x29, 0xd3, &(0x7f0000000300)={{0xa, 0x4e22, 0x6e43, @rand_addr="c85699f5cc8e4c43e0bd250c5eeb02ab", 0x8}, {0xa, 0x4e24, 0x80, @empty, 0x8001}, 0x9c7, [0x57, 0x7a, 0x9, 0x64, 0xfffffc01, 0x7fff, 0x6, 0xc0000000]}, 0x5c) 03:39:54 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:54 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) write$P9_RREADDIR(r0, &(0x7f0000000000)={0xa6, 0x29, 0x1, {0x8, [{{0x24, 0x2, 0x3}, 0x8, 0x4, 0x7, './file0'}, {{0x4, 0x1}, 0xffff, 0x1, 0x7, './file0'}, {{0x22, 0x1, 0x1}, 0xbee, 0x8, 0x7, './file0'}, {{0x8, 0x2, 0x1}, 0x6, 0x5, 0x7, './file0'}, {{0x40, 0x2, 0x7}, 0x0, 0x6, 0x7, './file1'}]}}, 0xa6) 03:39:54 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x3b, 0x37, 0x2, {0x0, 0x9, 0x1ff, r5, 0x1d, '/selinux/avc/cache_threshold\x00'}}, 0x3b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) 03:39:54 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:55 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f00000007c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)=0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="09c53d1224730deccff26dd3b806023cabf841b4a9eefdb8e6763f6af3507a9e068806d6eca628dcbec14b232e34fb2a2b3e076ab2690f86589490ab82bff95bd2c22876610a3dcf08b9170197c549275f226984845a05da54dcfbfe53a15481f126e23f3d1c10130d01888802bab8083127a06558350cd0d5473c2d2e2a8597c42b766153f62c14d50b2e9f9a7d37e4c8ab1a65827c3de44434e5026f996b066adb092c542ff212fd5f2fb28c315947e504a7439ddf96fcd11e927c428141d93a6f07f81a19aeed8c", 0xc9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="5c1134255b2290325e10ea5ee9ca685a", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)}, {&(0x7f0000000300)="9d1d5de868a3420429c1140722ac79178b23a24e95137f10c342ff869c5a552b91050ea383e0bb74eadea58073f092bb32f52d15ddd0aca5e15ab393380f0f14cc39e3320cb6aa2912a922df559d7e915b67d9a301dcf5873993e50b41df0bb0c0ed721e4cf564b17a83b373bf55a300cc392f8817af7353608f0ffe5e44441342ae2900f8d194134c7136f300a8a21fcba4f193c39fc4964b90894c4e7f2fe29359400804e4ecbf5c2b95dec67ee55eeb4fc09e8cb5f1f0a5a2f5603592db0ebf12a31cf1e106504f727400a6e4e50a8ac0c93b", 0xd4}, {&(0x7f0000000440)="e0cd7ea6c1356c9c2844f38558f52eebbe4de4b8f80276c0f1af1b9815533091a22eb8138582e01e48f1b622f59d5f066957cc495d871bfa33f724e4f3435c1360f83ead6bcf5bb18e7b50a03a1a6e8d48656531aaa4e530fc94385f28820700e0018deb327ee6ba4ed9ec5b263b592e08292664ec7218ba81decb0120c1d843e10b9777e03df0e8bd6388331ad2330a7eabab3866f79c340038c750174fd1e0cf315361cf6db3d66c56652efc1664f25311869b6ee961f0ab470879153af0b172b18c25ed8f9b85f2f36d787104c314ac89acf6dba91e", 0xfffffd49}, {&(0x7f0000000180)="61b1a481e2b1114825fa378616305d5eed8e6d14daffe4e99430c00f35f5c5a09cd27d0f46a3fb2ba8961d296702576b9afbc4c06b9d0151f865a2db5ee9b0c754a705ce186fee0f2beebc64e633709330e1768adcf4877e1f79550fc078e4ecdc146c684608e03a478d09a56917", 0x6e}, {&(0x7f0000000200)="19aec9289f", 0x5}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000540)="cf9a110a732ad25745", 0x9}], 0x7, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0xfb}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x48, 0x29, 0x39, {0x62, 0x22bd, 0x1, 0x4, 0x0, [@mcast1, @loopback, @local]}}}, @dstopts_2292={{0x228, 0x29, 0x4, {0x5c, 0xa, [], [@generic={0x0, 0x49, "9bab0cdace4420065ca72dec862b623e76465869079321ee946e4ab4550b95609d0227ffd9f8e6efdea544aaaa25cc9cb818a561bf857df571d0d59d51891ed7510d81e9913be59ba1"}, @enc_lim={0x4, 0x1, 0x1f}, @enc_lim, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x67, 0x0, [], [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x7}]}}}], 0x158}, 0x800) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:55 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:39:55 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:55 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="aae38f95bf8520d689b76eca60b44cffd921f4395fbfa4d8ff0dac39882fbabccb593ec13cbc7609c8fdacf2c22a4443647d102eae959d9f6c32e9eadbb75c2484eebc5ad4373e15f31525bc0fe241148c42e43e72d176b767b249c29e87fb60dce308551525df22af272b82c61c793e9352a5c3a750a8c4b0ae4906e41261c177a9dc8e6edfe6ecabc32f0809bedd95cf03ca8a388d1e7c447a7e2748f7ac0e639ae18e9ca8094ba926cc6e7edb1b56b8571bd1ee21bbb1ad3a28bfafcdf72e6d23ed898ed23a8776133df002c24c68fec7df5e26e8a09feb6daab31affbf182efe725aa655631d54072c15426f688e20386eaa2b8dc8604d02ef1f5f92a082d629119163512b98c044cd05578bd4e8f491f5a968070f48b1e69443611a64fdb2a49256370ee166e7e31da10c93b0f3a0161808f18d9e37780ea4cc416e7ca64b284309409c68ff72fd580dc343a7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) fsetxattr$security_smack_transmute(r2, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="3030303030303030302c757365725f69643dff042400000400000000000000000000000000000000000000000068f17faaec6c1e13bb82935411adf5cfb964018d2aa7bb57eba5a791", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r3 = fcntl$dupfd(r0, 0x0, r1) r4 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) write$FUSE_LK(r3, &(0x7f0000000080)={0x28, 0x0, 0x6, {{0x0, 0x1f, 0x3, r5}}}, 0x28) r6 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r6, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:55 executing program 2: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000001c0)="31dd88e9cb2fda5852930f09f51afbe4e939e0d5ef3d9d3035a34df216c11036d92c9499f804f8e11639f21dd07870b45a0aaf2b6197f32728def41609a2de42780ff0dda1eba7a9031ddf0dd36c5a4176ea2c677264fe6167b6", 0xfde4) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x1000) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000040)) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r9, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r8, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r10, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32, @ANYRES32=r11, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10, r10}) 03:39:55 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000080)='md5sumwlan1\x00', 0xc, 0x2) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:55 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x6c, r3, 0x384, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x7cbb34392528e68b, 0xa}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x28}}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x40054000) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:55 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x7ffff000) 03:39:55 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1d) r1 = syz_open_procfs(r0, &(0x7f0000000080)='smap\\\x054\x90\xd0&\r@p\xca\x00\x00\x00\x00\x00\x00\x00\x14\xb2\xe7_\xd5\x87^7\x9f\x92\xde\xd3\xfe') r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1d) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r5, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r7, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r8, r9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r10, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r7, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={r12, r6, 0x0, 0x23, &(0x7f0000000140)=']-ppp1prockeyringwlan1keyring\\bdev\x00', r11}, 0xffffffffffffff3d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r3, r4, 0x0, 0x22, &(0x7f0000000000)='smap\\\x054\x90\xd0&\r@p\xca\x00\x00\x00\x00\x00\x00\x00\x14\xb2\xe7_\xd5\x87^7\x9f\x92\xde\xd3\xfe', r11}, 0x30) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r2, r1, 0x0, 0x7ffff000) 03:39:56 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1d) sched_setattr(r2, &(0x7f0000000000)={0x30, 0x4, 0x0, 0x5, 0x200, 0x1, 0x40, 0xdd20000000000000}, 0x0) r3 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000340)='posix_acl_access*\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r3, 0x35, 0x18}, &(0x7f0000000680)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000740)="c191d54428e32b413affbe0ce9549505cf224be679783ace910c52c9e720c8509e07c042e9697a46664c2b62961407273734c03633", &(0x7f0000000780)=""/24) r4 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000340)='posix_acl_access*\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0x35, 0x18}, &(0x7f0000000680)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000740)="c191d54428e32b413affbe0ce9549505cf224be679783ace910c52c9e720c8509e07c042e9697a46664c2b62961407273734c03633", &(0x7f0000000780)=""/24) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r3, r4}, &(0x7f0000000180)=""/107, 0x6b, &(0x7f0000000300)={&(0x7f00000000c0)={'nhpoly1305-neon\x00'}, &(0x7f0000000200)="693a9e54e1b09fab25715fe5c985d08e88731a21e7dc043e635d138cddcadcf921c44cf77a02f99ed7e4a52a3948", 0x2e}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r6, 0x0, r5, 0x0, 0x1000000000000003, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x4, 0x0}, @remote, @rand_addr="20674a3bfef886246a00000041dae663", 0x6, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:57 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c7573b9538465725f696422", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, 0x2, {0x8}}, 0x18) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x220210}) 03:39:57 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) pidfd_open(r4, 0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$FUSE_DIRENT(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:39:57 executing program 4: mlockall(0xe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x80, 0x4, 0x6, 0x2, 0x0, 0x8, 0xb1140617135abfad, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x40, 0x0, 0x1, 0x6, 0x6, 0x7b6, 0x3}, 0x0, 0x7, r1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r3, r0, 0x0, 0x7ffff000) 03:39:57 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x5, 0x4) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) sendmsg$nl_generic(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)={0x2a4, 0x2e, 0x20, 0x70bd2b, 0x25dfdbfc, {0x2}, [@typed={0x30, 0x67, @binary="729b0709ad49520a261ac370643939cd88ae0494aa050b2388e72cc818b6e2f7705d53ff92277bcb99e60998"}, @typed={0x8, 0x2d, @u32=0xf36}, @generic="00b0607c80a19a30cb4b1fd874dfff717bbb11eb516748e1a3b695b7f1ddc879ba9410063a653a84f79462ae10de1ae8cfd5a48fc829cd683414d48bc8d900d4d5b525b81f06ee1f2c3dd121623cc9cb0c654441f59cdd954d4637cda1619f331c7a0b1d42b2b9d6a8c1d215d6518dc2b8a88bef6fcfcbc7fc76c0416bf3f8a29c3f0c293378a46c393b32a76437e000e2d16eb3531fd7aa923fca", @generic="db0b5447749482e04ed6d2345776fe231bf988da85fdc13542b1501ea84771a9019e9646a34ddcb63986fc659b54c224f3a2d6b28639feb5fb17b6e9e1b35d77a25736cb39af9e9a193473fd61344b66328d3672e0cbd03b80e4c015112f7c438b6cfa63cad61fd28883505f6e154ef67c6c9b635ee91ca1bd743ee10ebe6cafe25245aa22b4a3a047b7cd7fccef78de154d374f50b8eaa4bf1048823c03082a27aee882d4d269867b1202918c5f8a21d7f6a0a1c2cae1f27b3f82071f9605488f6b3bfc6e0507fae976a345511da79df6d303d4b15278705fa0f9b2fd9410a68737c9ad16610633b2dbc0298b4554a686b4e636bd89", @typed={0x4, 0x3e}, @generic="f97ac9fc1492af42dd29f6806a374fb90732521f893ddfb252e640fc49e446ddc4e1b3dba2d1fdd86382fdee2574807512ff3667f47452f73665aa599509e53fc0505eee25e11ae1df491bd068dd339dcd50687ad06d763af2691009b5c64a1b9c5599b6c3e0d6f59286c8c9db5364c7217c620fe74c36dc68089fe5af9f990efe65f2caea0f7f65fbd22ed0e91b1fcd5926494ea652db5566f8b89095f744a7ada4b77ccb3bdce269459b5ffeb08d7d6a1b3c79a50ee4f8380195c9bcd8a7011d"]}, 0x2a4}, 0x1, 0x0, 0x0, 0x804}, 0x4000000) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)=0x3, 0x4) 03:39:57 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r3 = dup(r2) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000080)={{0x2, 0x800, 0x9, 0x4}, 'syz0\x00', 0x2}) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x5056b1af5d3e4244) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:58 executing program 2: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x3b, 0x37, 0x2, {0x0, 0x9, 0x1ff, r5, 0x1d, '/selinux/avc/cache_threshold\x00'}}, 0x3b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) 03:39:58 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) write$binfmt_elf32(r1, &(0x7f0000000c40)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x81, 0x7, 0x2, 0x0, 0x3, 0x3e, 0xffffffff, 0x15c, 0x38, 0x37d, 0xa6c2, 0x400, 0x20, 0x1, 0x1000, 0x730, 0xfffb}, [{0x5, 0x90, 0x3, 0x40, 0x0, 0x10000, 0x364, 0x3}, {0x0, 0x2, 0x3, 0x4, 0xfffff800, 0x6, 0xa1, 0x4}], "7f742d818594c87d279b88e3fbf747715a0561dc06ccc5e684070b412c8e0b0f31e880f6ddb29a19927f4ccadb2c3112dd3cc04385adb6286018b0f81601107422e5f67f1fe8b18075668931b5735ac30a194c2864db4379877ab72711c13e50901ac1ef48f43578d7da55548543bc9c2f92c53cceb56dcdb57f28fe7c820474260e588c1c450994e60b3b1ae997f177a76a6585beb42d5ef4e15656dedc0c986664e6b77b3c8361e9629b08d22b45226821a24a67cb1cadc2dc47d1c895c74a411c626a9c28ff10e6", [[], [], [], [], [], [], [], [], [], []]}, 0xb41) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r3 = getpgid(0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x3, 0xffff, 0xfffffff8, 0x4, 0x81, r3}) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f64653d3030b0303030303030303030303030303030343030300080757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) fcntl$dupfd(r5, 0x406, r1) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:58 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xe}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:58 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:39:58 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x2ec, [0x0, 0x20000140, 0x20000170, 0x200001a0], 0x0, &(0x7f0000000000), &(0x7f0000000140)=[{}, {0x0, '\x00', 0x0, 0x1}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x11, 0x4, 0x4833, 'ip6erspan0\x00', 'veth0_to_team\x00', 'veth1_to_team\x00', 'netpci0\x00', @broadcast, [0x0, 0xff, 0x0, 0x0, 0x101, 0xff], @dev={[], 0xc}, [0xff], 0xe6, 0xe6, 0x15e, [@ip6={'ip6\x00', 0x50, {{@rand_addr="6d658998a191382e5d9efa4133b1b314", @empty, [0xff000000, 0x0, 0xffff00, 0xffffffff], [0x181000000, 0xffffffff, 0xff000000], 0x1, 0x3a, 0x1, 0x10, 0x4e22, 0x4e24, 0x4e22, 0x4e24}}}], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x5, 0x7, 0x0, 0x0, "f5cb883a670746f306063e5475ebc31ba797c32a5a57c23efe53392986dff8ccd2988019800bf80cbdbcc3781f150da04edace8d135e2cfe6f251d7fa65ef8ba"}}}}, {0x3, 0x30, 0x22eb, 'irlan0\x00', 'nr0\x00', 'gretap0\x00', 'bond_slave_0\x00', @dev={[], 0x12}, [0x0, 0xff, 0xff, 0x0, 0xff, 0x1fe], @remote, [0xff, 0x1fe, 0x101, 0xff, 0xff], 0xae, 0xae, 0xfe, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x20, 0x10000}}}], [], @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x64, 0x76}}}}]}]}, 0x364) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) vmsplice(r0, &(0x7f00000019c0)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="0635fe87b0d7c889b4a318be775bfb301219b74f36944a187ca1903dd31cf1dbfd58ee7eea70d14240c3960b875224d970bb465a69e0cd434b9d1f11d1af502da3c3ec931e151d2edf1944a30e8ff699384819712ac8e19489662791abc4ddcc355a4237f445c604e1f042c632ada2fff806483a8202083a2fa78dfa20aade81fbb7269d33641cf42f3a4586e2863fa4a54a08d4accb1b6d976718fa2efa4ef4f51c6634fdf1653f38dcaec4a03b7d0927b5a65c40f6d679fcb756f667529f652ad3", 0xc2}, {&(0x7f0000001540)="1a32672371feefc1dcd0219e2fb9d9045b153d3833df402d8ec15cb5e4863c2810e2592131f7ec506d2ccaa82a050cbd68e5a679f73571fb4f671d8de938228429d1db10fb965213a9afad70ddb4854aad745ceb49317bf179d9da70b70810eb6448e9c0c0d25f8b2d29d85af32a0de92fc19d738d05c78143388d9c9b", 0x7d}, {&(0x7f00000015c0)="068104df500fe77d8de7244a8851fd5b846e1dafc83bba2521d9671fdff1b8b05de889ded5f333dba8f5a076d53239b94007733798d83f4cfe77249980e98455a3bae87ac98611d28f267e734edcbe52db762af331d81de10283b9efdedacb742900699c836da670123883b279204409433c973e9829f8f5b795691146b18e7f376c92d5a6196757b4b8194d0379d8a5a26f2ddd7b1c1298d858e25aee0f1c9ddb1b6332e92f4f50777975daee3e788e5e34552a7a17f5d3e63462e11426d2b357b50e20d9a404f68b60d5502654ef0984d117e4f9bc657f8c470370", 0xdc}, {&(0x7f00000016c0)="2dc34583d851c3161e2cc50366d6da4a834b0456f3d1970aacf6ac4049df701e0335e98f4510d98f062483a240ec3e89c22e0863185236ed02cd50ee59491002d5240d22c0c887b3162152eb80d72f284dfb76642a6f13c64fcc84f3f865531daa8b824737cea3609270d7e8e0dfda526523e706859ada58c022bcc94160e2fad46f0a564338d4e7add89bbc02084f049455bd8ad0c415186b4ede6edef4b11489d0481d87815e5ca597b68e705a80349087729c3a63a13a113635b4d074a0ad3cc2979e682201ff98d87cfd2d63c2bbe8b949b2cb4be45e49", 0xd9}, {&(0x7f00000017c0)="9141233b6af49d6c31d93fb83150ef5b17887066c88ad0b1c577d00c5795f08ba92e30d1093cecf589e3e97d414fade5332a4a863443007db7b891f1a5df887be7ec13025b66a52588eabde877d8c0556a4fec2e86e9db62867b81d4df6d41118c780fc2b2930a195eafa54a97b1", 0x6e}, {&(0x7f0000001840)="0dce5ab04981f96cf243792deffcc2a389e71a8c95e43624fcce9ff379a5dee622733d4c6c28f6d53d9524a3cbfe73830615b759e627c656948258e6a7460752935d3e7f428db91e7ff2fa08863fbb9bf4c100627cdf9b60c3f7f1c160ee5543102e6a5490447fb560c0aa5b1cbc500e59dfd5d74a70ec66c07474c937b4a902ac32f289b3ec8bd04140e3011c916cdb072f37e4e822e53639f1547082221ee8b1852c7fa68bdc045bd2346fc7ba01a1c816ef9d351da658dede28c010ae3d8e2307d573796ac970a5f582", 0xcb}, {&(0x7f00000000c0)="08d34246e7614fa73267e608e2681f5563692665a1608fbbd0a0a0e090cfab3aa2699022a0853cf7fb3c2b80775f404391", 0x31}, {&(0x7f0000001940)="184684aaee131a1424d6deb5eb314de6fc1df5cc5a4b2f0961a5f2f362987dd46b6690ebd707bc067b95a0baefbe5640767235fc6e06aecd9b48276d3f60c18fd7e6624940198d8284253695a050629533628c654e81a633081b5a72c092ca1c0efbd8e10a0a7389", 0x68}], 0x9, 0x4) 03:39:58 executing program 0: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x6}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0xfff}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:39:58 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x81, 0x989) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:39:58 executing program 2: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x3b, 0x37, 0x2, {0x0, 0x9, 0x1ff, r5, 0x1d, '/selinux/avc/cache_threshold\x00'}}, 0x3b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) 03:39:59 executing program 2: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x3b, 0x37, 0x2, {0x0, 0x9, 0x1ff, r5, 0x1d, '/selinux/avc/cache_threshold\x00'}}, 0x3b) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) 03:40:00 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r3, r2, 0x0, 0x7ffff000) 03:40:00 executing program 0: r0 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$TCGETX(r5, 0x5432, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r4, r3, 0x0, 0x72439a6b) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0xe7533cb7e28df944, 0x0, 0x9, 0x7, 0xffffffff, 0x0, 0xc1d}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:00 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "99f43e950a5472085b81acfd089aee700499"}, 0x16) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r3, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:00 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7ffff000) 03:40:00 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f00000007c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)=0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="09c53d1224730deccff26dd3b806023cabf841b4a9eefdb8e6763f6af3507a9e068806d6eca628dcbec14b232e34fb2a2b3e076ab2690f86589490ab82bff95bd2c22876610a3dcf08b9170197c549275f226984845a05da54dcfbfe53a15481f126e23f3d1c10130d01888802bab8083127a06558350cd0d5473c2d2e2a8597c42b766153f62c14d50b2e9f9a7d37e4c8ab1a65827c3de44434e5026f996b066adb092c542ff212fd5f2fb28c315947e504a7439ddf96fcd11e927c428141d93a6f07f81a19aeed8c", 0xc9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="5c1134255b2290325e10ea5ee9ca685a", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)}, {&(0x7f0000000300)="9d1d5de868a3420429c1140722ac79178b23a24e95137f10c342ff869c5a552b91050ea383e0bb74eadea58073f092bb32f52d15ddd0aca5e15ab393380f0f14cc39e3320cb6aa2912a922df559d7e915b67d9a301dcf5873993e50b41df0bb0c0ed721e4cf564b17a83b373bf55a300cc392f8817af7353608f0ffe5e44441342ae2900f8d194134c7136f300a8a21fcba4f193c39fc4964b90894c4e7f2fe29359400804e4ecbf5c2b95dec67ee55eeb4fc09e8cb5f1f0a5a2f5603592db0ebf12a31cf1e106504f727400a6e4e50a8ac0c93b", 0xd4}, {&(0x7f0000000440)="e0cd7ea6c1356c9c2844f38558f52eebbe4de4b8f80276c0f1af1b9815533091a22eb8138582e01e48f1b622f59d5f066957cc495d871bfa33f724e4f3435c1360f83ead6bcf5bb18e7b50a03a1a6e8d48656531aaa4e530fc94385f28820700e0018deb327ee6ba4ed9ec5b263b592e08292664ec7218ba81decb0120c1d843e10b9777e03df0e8bd6388331ad2330a7eabab3866f79c340038c750174fd1e0cf315361cf6db3d66c56652efc1664f25311869b6ee961f0ab470879153af0b172b18c25ed8f9b85f2f36d787104c314ac89acf6dba91e", 0xfffffd49}, {&(0x7f0000000180)="61b1a481e2b1114825fa378616305d5eed8e6d14daffe4e99430c00f35f5c5a09cd27d0f46a3fb2ba8961d296702576b9afbc4c06b9d0151f865a2db5ee9b0c754a705ce186fee0f2beebc64e633709330e1768adcf4877e1f79550fc078e4ecdc146c684608e03a478d09a56917", 0x6e}, {&(0x7f0000000200)="19aec9289f", 0x5}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000540)="cf9a110a732ad25745", 0x9}], 0x7, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0xfb}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x48, 0x29, 0x39, {0x62, 0x22bd, 0x1, 0x4, 0x0, [@mcast1, @loopback, @local]}}}, @dstopts_2292={{0x228, 0x29, 0x4, {0x5c, 0xa, [], [@generic={0x0, 0x49, "9bab0cdace4420065ca72dec862b623e76465869079321ee946e4ab4550b95609d0227ffd9f8e6efdea544aaaa25cc9cb818a561bf857df571d0d59d51891ed7510d81e9913be59ba1"}, @enc_lim={0x4, 0x1, 0x1f}, @enc_lim, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x67, 0x0, [], [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x7}]}}}], 0x158}, 0x800) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:00 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000280), &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffdbf}, 0x48) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) dup2(r0, 0xffffffffffffffff) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x200, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x7fff}, 0x8) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) 03:40:00 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000000)=0x7ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r3, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0x78d1a873abe3a7c2, &(0x7f00000003c0)=0x3ff, 0x4) splice(r6, 0x0, r5, 0x0, 0x1000000000000003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r9, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r8, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r10, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32, @ANYRES32=r11, @ANYBLOB="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", @ANYRES32, @ANYBLOB="011d00f8bfffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000080)={@ipv4={[], [], @empty}, r10}, 0x14) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:00 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f00000007c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)=0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="09c53d1224730deccff26dd3b806023cabf841b4a9eefdb8e6763f6af3507a9e068806d6eca628dcbec14b232e34fb2a2b3e076ab2690f86589490ab82bff95bd2c22876610a3dcf08b9170197c549275f226984845a05da54dcfbfe53a15481f126e23f3d1c10130d01888802bab8083127a06558350cd0d5473c2d2e2a8597c42b766153f62c14d50b2e9f9a7d37e4c8ab1a65827c3de44434e5026f996b066adb092c542ff212fd5f2fb28c315947e504a7439ddf96fcd11e927c428141d93a6f07f81a19aeed8c", 0xc9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="5c1134255b2290325e10ea5ee9ca685a", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)}, {&(0x7f0000000300)="9d1d5de868a3420429c1140722ac79178b23a24e95137f10c342ff869c5a552b91050ea383e0bb74eadea58073f092bb32f52d15ddd0aca5e15ab393380f0f14cc39e3320cb6aa2912a922df559d7e915b67d9a301dcf5873993e50b41df0bb0c0ed721e4cf564b17a83b373bf55a300cc392f8817af7353608f0ffe5e44441342ae2900f8d194134c7136f300a8a21fcba4f193c39fc4964b90894c4e7f2fe29359400804e4ecbf5c2b95dec67ee55eeb4fc09e8cb5f1f0a5a2f5603592db0ebf12a31cf1e106504f727400a6e4e50a8ac0c93b", 0xd4}, {&(0x7f0000000440)="e0cd7ea6c1356c9c2844f38558f52eebbe4de4b8f80276c0f1af1b9815533091a22eb8138582e01e48f1b622f59d5f066957cc495d871bfa33f724e4f3435c1360f83ead6bcf5bb18e7b50a03a1a6e8d48656531aaa4e530fc94385f28820700e0018deb327ee6ba4ed9ec5b263b592e08292664ec7218ba81decb0120c1d843e10b9777e03df0e8bd6388331ad2330a7eabab3866f79c340038c750174fd1e0cf315361cf6db3d66c56652efc1664f25311869b6ee961f0ab470879153af0b172b18c25ed8f9b85f2f36d787104c314ac89acf6dba91e", 0xfffffd49}, {&(0x7f0000000180)="61b1a481e2b1114825fa378616305d5eed8e6d14daffe4e99430c00f35f5c5a09cd27d0f46a3fb2ba8961d296702576b9afbc4c06b9d0151f865a2db5ee9b0c754a705ce186fee0f2beebc64e633709330e1768adcf4877e1f79550fc078e4ecdc146c684608e03a478d09a56917", 0x6e}, {&(0x7f0000000200)="19aec9289f", 0x5}, {&(0x7f0000000c40)="8c5688bc488c682bdbe44bf133d4e29efefe0d8facbb4a7bb8bc3ab62c5b0391bf49426945a4194247c795231bd696a991967d94ec579e3bb46ac304dc6da31f9e9a8cb60774e005d6c82d5144cec1aa32d5c14dc7c606466bd3f80b46caaed6d3d4c0006e0861837b0ccdc309d3adc419d47df875bce52b3b85cbe419c41bd36c7b8b0d2de059cd107a4ef94b4d3f6eb837bab4cfa715e180fe99e5942c94fb98b98d2a17fc968d76a51d872d6073f8928f0553483873c99cca4ea35af06c629b96c5cc86cefc5c2ebe648502e892da44b3220b417d09085daceabbd7cc1aa509b53a49451ebf54ce6e2c7bcd9a2a7380aee7ebce38f790f9064d6f965853ae4833ed8b74a1a47040a15ba0096cf26b59c2c225e48d80ed83d11336b080b99a970174ce815cd7e3900beccb595b141716412a61b1365a3b37e5269c8d73a2df0618b177c8e47c832ff8c6d764d5ac508a6ef53e4482c5803ff136bb99a933f254d7baf1495cff656feedbf8ec4757990951ba7a4e47f5bdaab665fbcb33fa12b18cec387a5388e74bfc5e0fc6255c93b4a96b73ca90698ce7e2ad5977f6f978d5b0d3eeb5076f66f9cfd07ab5c57ff5cb066c63966e62c58a8c090fdb3fe60f677bf0f5ff9040ecdfd7ba00160b7c924f2b324bbe7a3b74ce338178318b9588b5edd20a34afdebbacdf8e9ccc20f114dc90cc6ba7a30c4dc2e3482b5fb72f5b348fe3ddb06fd4c90d084cf16ac201e9cb719bf0e3df3c9f34010cf8a25a64570e3420acd5abe128f352e98325c0aca756fce7a73e158cb85a1ae8e153d77a8d6c2602a3459d126fa79f2b2f7cc7ba2fe8ab82c85b70e99532f820664b2a6d38a6122a3ecaadada1658be36a8f7b4831f0626766ad94d7b721a9a40853efd916e24cbaff1e67893d8440da80d161dc8ca82e21d98f198f3c510f003b7c6944fb2e406073e8ab963f541534f12738a02b4d96fd9bb4bb4edb3af1db1744649c53ca8b06da6bf8f1ddd1575013e3880300e4e47465b2e4bb7c72aabbd4c432dfe90eda38602b17474bee1d2cccc671fa4ec070a1a1b24a905fba46c522c8611b8acd69bae3673d3082f3df6a768cd3b0c1ea39e32c16233971935caca7e1d7259c80913e21bedf3c6a5d99860fe13435a90b30406129dfb33fd4de0dc04f3f65b55d91452cc6fe6a5b278796b57c7e4bfa3b5411d1db3c2e0c75f50fc287d0760262d637f66a00e02a368d9929d33d96c7fa69380fcb4a9b317278c293ea4916e0336431e8c2847868c20e75fd636806f0580dad6b3579a3c022aadc68f37441e2a459a6e9be0b9cbf3418e6651129bace69247ea4f5ae2bd5318bd0ce9b5b2bf503078847f8b321bec915e9c75f9bfda5a48405552161b59c9436521b46de9bb58dd01deeb93acb0779d0ba82f921c593937a4e03f095a32f2e9c76a4c3c0e9cfff945f57a822b0892e8bc07ae84757e7913acd5151ca02bb0ffdef45b573e2173ddb2ee2bc571018484e5dc2b25e6975c8b3dcfc9cfa540b9ddf12b89a77bdea96dd3b7410089b601e627adae04153424629fcecd0d24b2c3e6fb3f56cabd97f8a1f32c140b0063c15c1e6798488ba4274fdc61ad6a69f152b43853b843894a4fb1a150dbbac738e835bfbe75396f16ddc1b0b6ffe4f3dd283aaf0c9d5def573165ab0f30948e84a604dda5930aea32a8e27220159a8a1ceb7557f31907e6161e194624951a34f906114f56049e38d1b586a6e35dbd06b42676e1d3db638b2e0f15f8324bdab9e3adc6fb7247d236a43e3aeaaac0848761d17790b37ec3d1cf4d4f3ed37ae87d5f844628e9edd63eb3766fd301313f6fdea7b0aa204df849a21729814384943a7d4125f10d2ceb973c6fcb241e1c677d382c3042222f49247775000130813e3454228caacd92a95c67d5b387eedbea16755a6e385423cfccc21ac010c642a01543f0ca9e63fc91c6dc4b96d4b48e57a219a99c169c750aa253ad3b21f85f91211fdaeb2536770b9e1a0d53c7b3eec6fec476d911c4b26b94c4efe2147d26d68aa645a19606c4720d831c8272c8b3037555e406f0f6129a6b00600c51e8c023ad2d85b517f526f26455cca1aa42d94ecd4c10923a7dfa960c3c07f895331b953382e51dd6b81a5bd280bed9fcbb99e606cc0e5b9d7ab98bf050f9d899868b8a407ab35fddf1c60a60c85185398e2e5da5c0683143029f90859ef3eee4428c734b4c60065d101a0dc2a3fa678ed369affe03c0b647a57b0696e019719a0fa1b927f4c527d861c43ba26daf19f04039eb71274df9f6f6f991465c512ba8f270f6f2b96e0665e6d8a93e35d5b79535d2f2dbc633cfbee9bb2ab33ab9fe84f089ff5926ae8f6831b25ba1fededb0afbb7f4d1daedcc16aeede2da4777e10b18c4687cf0aaae76cfd8c7afc9377fb0e18a4b995e8d40d0fcd1821a06250fae86c3b36736a2027e994eae3e82504c7dff433a14ffd1ce18c038b04ca4176e0275fda077b581d050afb769bcd9fdb8bf95180f726bbd841a6415f9b313e669d93d50287abcc0dbf12075a3ce99436bf8bf2105a73bf01b42f6f9bc108ee1a7a9ce986356bbe1a78757a0c8724b159ac241ff833771c341da3883953bc1c9f299daae2383abcabc288f87a1bad52af42c6a94292af96c65db4725a5faefacedfd6b38b73af56d66d3d4dd3854bcbc242cda21e0c5aa7a0826b3df124b556f670b29da1d601cec34ccebd5426722f5de0c9167f7377556e0b1978ae6d3170ee00b9c39fc5904679899a9583a4abffb0fcfd6f2eaedd75ed2f29a8f9599ba99484603919f9f8a191ba4cd8e986e559d09c43cde75dd10c2c89ee3a3e0f1ebcd7244dd907449ffeaf6f48fcbd6ca49f7ef21f14cec64fe8ea395031b5c2e9ccc1235e66ba2a5b80d539aeee6237ccf9669229c30d57e5eb3c1d213cae0a42ea5a554c8d2ce333cf1080079e96e11ed308bea831d65af674e1c2581edad047a43aaddddd723161c8faa09e4945625eaabb6ae33c0b4ef91f76826e21b7802a4bdc47ab7f4d4a3de594a679141967e5c64d66c2bc8de779336b079737552c7489b9066a95d7d3d35a0c71840c191b645bcfe3a74c9c81120d323ea47f27c3270a49fedae4a8ffc0c9d3f5285c32d448230ff304577ab13970e5e8f833a9e869beb93f240ddf5a44bedc4c9cb43cddb6f722e8e28f67d55d359c8056ff841d3184411fa4e3c379c7b903b0a514f45efd0c6d86e0cc2625f37cbf1a5d272a61e422b02f7f669c9dd0f9cf5636ddabb25661c8d03b02204f13308de506c70f029a1cf34eff65fa80c2051225b10b1f962f47b23949802f7ce04fb09d8492a2602294b3301d823952b31379ebbecfbaa870233033fe5ed599ed3a0aa0e2fde477a1c4474e3fe5c3b61a06de888ac85da114610a683abbd9c00a3f99c31614d62156ff41ea5048f1f8a693ace082a4be7adece36dd2663c84ef00878b0f9bd5fd63703856c8e8984d63ebecfbb361e9ad515d74c0fa71d7657958627886782bce0cf1603e6a68fcb2a0810dd2335ccb8f5b32c0087e2421a3901e44148898ed8f134ac68d585836669a320816b3eab25f74d8e650a3524563acf36c51c28538226ceec0d274a7f91b76b6d0559b0e1cbd660941fae9fad147913be28f9ff3036475bebe5280a54fc19f0a5ebdabdf04df45b6ab9361ce6c3cb8def8e015fef1b3e53076bff1350c5ce7a90bff99a41ff4700a187d244ec49883a9e4dca1c7392a37432468e9ab9893019c273b98e4435b070075771124c3da9a25624ffc438d39f8c6fb657f6669e0c901abfa162acf5f4f45fbeea1b27a3e86d875604ff5c74061e187b14bb98942a17eaa917f93f20be80f36e69a89ad77df6b4403edcee9fc520f21ff78ef468b43c292ca09d80e9a1a71d7dc5a23377445d7417745b8bf82c7f6d326b1db916ed930e55c554a3a93d4d03900f2122047976d65e26ea666e4d01968c40efdd241604a32bed795a28ca4adddf117fc431cb275156fe8d5ac935941ad444bb7e085837f00ac4ad3b0eed3e7ed3c7b8722a594e8d2541d9420e7e799d8a5e19df608a85919f3316544e184ac18e4ccc3a75b84a3aaa1d20c5a2e36ab0d00639e18a1a810af584a7c825e8053c038290bb089c61a7a77a809d46d0cd645656d60dcdffaeb47cd50be4cf03e73ea800d725e37f5c40b84333050c1889a78fdc6d547957fce67214d4b904e5294e4c7a7290328164228b8b15ddb6c183c842ae4f6c50f284d43dcb07398fb4262b5a59b367b572f3d6ed43b574a240a1e807cd0d942c1dd8095599181906d6fab54b59cee50806f60cbe4f83b37ae141d36f1f98a6f9423746929545843b84244ea5345e6635b99d2b2b936f353bf7e14dc485a14aee3adb05758cca454f7d6294a1b786d5b8093c78389453862d4299a653584a1fdbcd7ad0f964edff395c0cdea8bf83701a2fc14aadc887987a1c0457e8d8cc5ef1e12650945bfeec9b0378895e6fb44d5a9ed8a904f4b4dd0f81d3ea650ed78dd4f9424c82656bcd92a23b869a733c99d95bef3db6dcc52623220b533ebc509cf45e0f1c3a5285324c0db9117ad4c8b6ddb4f549b18f87665d79176fdce733fbc14b44d8db1ad04a8e26c8da3955fb8c15f249a9d40103dad91c23dd8250c05274468db3774fefaa68969f5fd323f4b07c99a52e0e55f68d1f24ef76ca07f2621020f0a023b78ea372fad5af3c18b97024eff678846e83e44a5b7643453429c61b72e3caccc81359d7e2155e1266b8198e4caff37ad017c372cfeb9400be709cc34b17913e8c37fdc47b452ab5757b4f9851a4d9f6e3ca5c4c3af2991e979da7861ed3ec382722af63c4fae469679dfd2919337c4e21b5c8222f1d4dcd1aeebca5928ee36eb230c2ca4dffa6b21e8001e72287678d5ba8794b0b3fc5e5b4529c245eed8e71cc30133f6de4999f0af6c6553e99ba395a172716b6bd8a17b3b552d05ebfeace5857ad4e62b51bf26da23c9822f3ec525cb8161b5b8a1f301062c98cc4a7c57edfe6d3dec05accdd5a75a3d2d18645f7aa54fbc3f23e2e3b40786e0778801842e20ffb7249733cf03c9824e474427c2c38954564f5c3185d8b840a62a9c433438ca813997087d19df99cdf390f48d00d813cb69978cb1c2b1ffbe4376755048d93e91e9a6d8437eecea479a2ba57d6e1c140b1de054eb44a4e1c7491cf97366e3b6806e1708898cd7cfed2612449fe7fa85c5ea74411be690bb18c38051ea8081967044684c4be0454f0a6c5e20bc777c1395d0464f453fffd3d5bcf62f380cc7b5be1d658e9e78568246ccce5a99b56f965ab3044c5cc726b69e7a87c8e2d153847b22b8f401cfacc0110f1a908c3df8336662f214d1b29c9fb7735da6e7551be2a4ab856e225926caa3c247b025ea2440609f6e91399882ef76a02e2edc0987cdda0097c04b80204f65522fdc231a7ca486c748ab9502424375970284c1e96fc82236c2ccffd6d581899fcab5298354766812fbc4e0a215d4c1125c7c2bf20fc2ba54c39d89e4020d0777edc95645a842009438ae34f3ee031b499935a7a8e6f64b3acb4b58bcd04be416388481ca5f220b26257b4ceccf643194444ee15c693013340bda22425212540d8e7f8987820dcd9d33219c47d75f1b3f2dd744954afbefdd94a8faac97a4cd5ad733be96496d7a71cc8f2087f2210ab8b9fd2e1c279a9c86f2a282f330f699201dbf8dd4fca0169e249dc0e37e888a7a37f8d77760f4500b42fc80039a9cae29abd42fcd1fa387655f81cc7", 0x1000}, {&(0x7f0000000540)="cf9a110a732ad25745", 0x9}], 0x7, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0xfb}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x48, 0x29, 0x39, {0x62, 0x22bd, 0x1, 0x4, 0x0, [@mcast1, @loopback, @local]}}}, @dstopts_2292={{0x228, 0x29, 0x4, {0x5c, 0xa, [], [@generic={0x0, 0x49, "9bab0cdace4420065ca72dec862b623e76465869079321ee946e4ab4550b95609d0227ffd9f8e6efdea544aaaa25cc9cb818a561bf857df571d0d59d51891ed7510d81e9913be59ba1"}, @enc_lim={0x4, 0x1, 0x1f}, @enc_lim, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x67, 0x0, [], [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x7}]}}}], 0x158}, 0x800) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:01 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f00000007c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)=0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="09c53d1224730deccff26dd3b806023cabf841b4a9eefdb8e6763f6af3507a9e068806d6eca628dcbec14b232e34fb2a2b3e076ab2690f86589490ab82bff95bd2c22876610a3dcf08b9170197c549275f226984845a05da54dcfbfe53a15481f126e23f3d1c10130d01888802bab8083127a06558350cd0d5473c2d2e2a8597c42b766153f62c14d50b2e9f9a7d37e4c8ab1a65827c3de44434e5026f996b066adb092c542ff212fd5f2fb28c315947e504a7439ddf96fcd11e927c428141d93a6f07f81a19aeed8c", 0xc9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="5c1134255b2290325e10ea5ee9ca685a", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)}, {&(0x7f0000000300)="9d1d5de868a3420429c1140722ac79178b23a24e95137f10c342ff869c5a552b91050ea383e0bb74eadea58073f092bb32f52d15ddd0aca5e15ab393380f0f14cc39e3320cb6aa2912a922df559d7e915b67d9a301dcf5873993e50b41df0bb0c0ed721e4cf564b17a83b373bf55a300cc392f8817af7353608f0ffe5e44441342ae2900f8d194134c7136f300a8a21fcba4f193c39fc4964b90894c4e7f2fe29359400804e4ecbf5c2b95dec67ee55eeb4fc09e8cb5f1f0a5a2f5603592db0ebf12a31cf1e106504f727400a6e4e50a8ac0c93b", 0xd4}, {&(0x7f0000000440)="e0cd7ea6c1356c9c2844f38558f52eebbe4de4b8f80276c0f1af1b9815533091a22eb8138582e01e48f1b622f59d5f066957cc495d871bfa33f724e4f3435c1360f83ead6bcf5bb18e7b50a03a1a6e8d48656531aaa4e530fc94385f28820700e0018deb327ee6ba4ed9ec5b263b592e08292664ec7218ba81decb0120c1d843e10b9777e03df0e8bd6388331ad2330a7eabab3866f79c340038c750174fd1e0cf315361cf6db3d66c56652efc1664f25311869b6ee961f0ab470879153af0b172b18c25ed8f9b85f2f36d787104c314ac89acf6dba91e", 0xfffffd49}, {&(0x7f0000000180)="61b1a481e2b1114825fa378616305d5eed8e6d14daffe4e99430c00f35f5c5a09cd27d0f46a3fb2ba8961d296702576b9afbc4c06b9d0151f865a2db5ee9b0c754a705ce186fee0f2beebc64e633709330e1768adcf4877e1f79550fc078e4ecdc146c684608e03a478d09a56917", 0x6e}, {&(0x7f0000000200)="19aec9289f", 0x5}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000000540)="cf9a110a732ad25745", 0x9}], 0x7, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0xfb}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x48, 0x29, 0x39, {0x62, 0x22bd, 0x1, 0x4, 0x0, [@mcast1, @loopback, @local]}}}, @dstopts_2292={{0x228, 0x29, 0x4, {0x5c, 0xa, [], [@generic={0x0, 0x49, "9bab0cdace4420065ca72dec862b623e76465869079321ee946e4ab4550b95609d0227ffd9f8e6efdea544aaaa25cc9cb818a561bf857df571d0d59d51891ed7510d81e9913be59ba1"}, @enc_lim={0x4, 0x1, 0x1f}, @enc_lim, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x67, 0x0, [], [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x7}]}}}], 0x158}, 0x800) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:01 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f00000007c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000040)=0x2) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r6, 0x6, 0xb, &(0x7f0000000600)="09c53d1224730deccff26dd3b806023cabf841b4a9eefdb8e6763f6af3507a9e068806d6eca628dcbec14b232e34fb2a2b3e076ab2690f86589490ab82bff95bd2c22876610a3dcf08b9170197c549275f226984845a05da54dcfbfe53a15481f126e23f3d1c10130d01888802bab8083127a06558350cd0d5473c2d2e2a8597c42b766153f62c14d50b2e9f9a7d37e4c8ab1a65827c3de44434e5026f996b066adb092c542ff212fd5f2fb28c315947e504a7439ddf96fcd11e927c428141d93a6f07f81a19aeed8c", 0xc9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="5c1134255b2290325e10ea5ee9ca685a", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000000c0)}, {&(0x7f0000000300)="9d1d5de868a3420429c1140722ac79178b23a24e95137f10c342ff869c5a552b91050ea383e0bb74eadea58073f092bb32f52d15ddd0aca5e15ab393380f0f14cc39e3320cb6aa2912a922df559d7e915b67d9a301dcf5873993e50b41df0bb0c0ed721e4cf564b17a83b373bf55a300cc392f8817af7353608f0ffe5e44441342ae2900f8d194134c7136f300a8a21fcba4f193c39fc4964b90894c4e7f2fe29359400804e4ecbf5c2b95dec67ee55eeb4fc09e8cb5f1f0a5a2f5603592db0ebf12a31cf1e106504f727400a6e4e50a8ac0c93b", 0xd4}, {&(0x7f0000000440)="e0cd7ea6c1356c9c2844f38558f52eebbe4de4b8f80276c0f1af1b9815533091a22eb8138582e01e48f1b622f59d5f066957cc495d871bfa33f724e4f3435c1360f83ead6bcf5bb18e7b50a03a1a6e8d48656531aaa4e530fc94385f28820700e0018deb327ee6ba4ed9ec5b263b592e08292664ec7218ba81decb0120c1d843e10b9777e03df0e8bd6388331ad2330a7eabab3866f79c340038c750174fd1e0cf315361cf6db3d66c56652efc1664f25311869b6ee961f0ab470879153af0b172b18c25ed8f9b85f2f36d787104c314ac89acf6dba91e", 0xfffffd49}, {&(0x7f0000000180)="61b1a481e2b1114825fa378616305d5eed8e6d14daffe4e99430c00f35f5c5a09cd27d0f46a3fb2ba8961d296702576b9afbc4c06b9d0151f865a2db5ee9b0c754a705ce186fee0f2beebc64e633709330e1768adcf4877e1f79550fc078e4ecdc146c684608e03a478d09a56917", 0x6e}, {&(0x7f0000000200)="19aec9289f", 0x5}, {&(0x7f0000000c40)="8c5688bc488c682bdbe44bf133d4e29efefe0d8facbb4a7bb8bc3ab62c5b0391bf49426945a4194247c795231bd696a991967d94ec579e3bb46ac304dc6da31f9e9a8cb60774e005d6c82d5144cec1aa32d5c14dc7c606466bd3f80b46caaed6d3d4c0006e0861837b0ccdc309d3adc419d47df875bce52b3b85cbe419c41bd36c7b8b0d2de059cd107a4ef94b4d3f6eb837bab4cfa715e180fe99e5942c94fb98b98d2a17fc968d76a51d872d6073f8928f0553483873c99cca4ea35af06c629b96c5cc86cefc5c2ebe648502e892da44b3220b417d09085daceabbd7cc1aa509b53a49451ebf54ce6e2c7bcd9a2a7380aee7ebce38f790f9064d6f965853ae4833ed8b74a1a47040a15ba0096cf26b59c2c225e48d80ed83d11336b080b99a970174ce815cd7e3900beccb595b141716412a61b1365a3b37e5269c8d73a2df0618b177c8e47c832ff8c6d764d5ac508a6ef53e4482c5803ff136bb99a933f254d7baf1495cff656feedbf8ec4757990951ba7a4e47f5bdaab665fbcb33fa12b18cec387a5388e74bfc5e0fc6255c93b4a96b73ca90698ce7e2ad5977f6f978d5b0d3eeb5076f66f9cfd07ab5c57ff5cb066c63966e62c58a8c090fdb3fe60f677bf0f5ff9040ecdfd7ba00160b7c924f2b324bbe7a3b74ce338178318b9588b5edd20a34afdebbacdf8e9ccc20f114dc90cc6ba7a30c4dc2e3482b5fb72f5b348fe3ddb06fd4c90d084cf16ac201e9cb719bf0e3df3c9f34010cf8a25a64570e3420acd5abe128f352e98325c0aca756fce7a73e158cb85a1ae8e153d77a8d6c2602a3459d126fa79f2b2f7cc7ba2fe8ab82c85b70e99532f820664b2a6d38a6122a3ecaadada1658be36a8f7b4831f0626766ad94d7b721a9a40853efd916e24cbaff1e67893d8440da80d161dc8ca82e21d98f198f3c510f003b7c6944fb2e406073e8ab963f541534f12738a02b4d96fd9bb4bb4edb3af1db1744649c53ca8b06da6bf8f1ddd1575013e3880300e4e47465b2e4bb7c72aabbd4c432dfe90eda38602b17474bee1d2cccc671fa4ec070a1a1b24a905fba46c522c8611b8acd69bae3673d3082f3df6a768cd3b0c1ea39e32c16233971935caca7e1d7259c80913e21bedf3c6a5d99860fe13435a90b30406129dfb33fd4de0dc04f3f65b55d91452cc6fe6a5b278796b57c7e4bfa3b5411d1db3c2e0c75f50fc287d0760262d637f66a00e02a368d9929d33d96c7fa69380fcb4a9b317278c293ea4916e0336431e8c2847868c20e75fd636806f0580dad6b3579a3c022aadc68f37441e2a459a6e9be0b9cbf3418e6651129bace69247ea4f5ae2bd5318bd0ce9b5b2bf503078847f8b321bec915e9c75f9bfda5a48405552161b59c9436521b46de9bb58dd01deeb93acb0779d0ba82f921c593937a4e03f095a32f2e9c76a4c3c0e9cfff945f57a822b0892e8bc07ae84757e7913acd5151ca02bb0ffdef45b573e2173ddb2ee2bc571018484e5dc2b25e6975c8b3dcfc9cfa540b9ddf12b89a77bdea96dd3b7410089b601e627adae04153424629fcecd0d24b2c3e6fb3f56cabd97f8a1f32c140b0063c15c1e6798488ba4274fdc61ad6a69f152b43853b843894a4fb1a150dbbac738e835bfbe75396f16ddc1b0b6ffe4f3dd283aaf0c9d5def573165ab0f30948e84a604dda5930aea32a8e27220159a8a1ceb7557f31907e6161e194624951a34f906114f56049e38d1b586a6e35dbd06b42676e1d3db638b2e0f15f8324bdab9e3adc6fb7247d236a43e3aeaaac0848761d17790b37ec3d1cf4d4f3ed37ae87d5f844628e9edd63eb3766fd301313f6fdea7b0aa204df849a21729814384943a7d4125f10d2ceb973c6fcb241e1c677d382c3042222f49247775000130813e3454228caacd92a95c67d5b387eedbea16755a6e385423cfccc21ac010c642a01543f0ca9e63fc91c6dc4b96d4b48e57a219a99c169c750aa253ad3b21f85f91211fdaeb2536770b9e1a0d53c7b3eec6fec476d911c4b26b94c4efe2147d26d68aa645a19606c4720d831c8272c8b3037555e406f0f6129a6b00600c51e8c023ad2d85b517f526f26455cca1aa42d94ecd4c10923a7dfa960c3c07f895331b953382e51dd6b81a5bd280bed9fcbb99e606cc0e5b9d7ab98bf050f9d899868b8a407ab35fddf1c60a60c85185398e2e5da5c0683143029f90859ef3eee4428c734b4c60065d101a0dc2a3fa678ed369affe03c0b647a57b0696e019719a0fa1b927f4c527d861c43ba26daf19f04039eb71274df9f6f6f991465c512ba8f270f6f2b96e0665e6d8a93e35d5b79535d2f2dbc633cfbee9bb2ab33ab9fe84f089ff5926ae8f6831b25ba1fededb0afbb7f4d1daedcc16aeede2da4777e10b18c4687cf0aaae76cfd8c7afc9377fb0e18a4b995e8d40d0fcd1821a06250fae86c3b36736a2027e994eae3e82504c7dff433a14ffd1ce18c038b04ca4176e0275fda077b581d050afb769bcd9fdb8bf95180f726bbd841a6415f9b313e669d93d50287abcc0dbf12075a3ce99436bf8bf2105a73bf01b42f6f9bc108ee1a7a9ce986356bbe1a78757a0c8724b159ac241ff833771c341da3883953bc1c9f299daae2383abcabc288f87a1bad52af42c6a94292af96c65db4725a5faefacedfd6b38b73af56d66d3d4dd3854bcbc242cda21e0c5aa7a0826b3df124b556f670b29da1d601cec34ccebd5426722f5de0c9167f7377556e0b1978ae6d3170ee00b9c39fc5904679899a9583a4abffb0fcfd6f2eaedd75ed2f29a8f9599ba99484603919f9f8a191ba4cd8e986e559d09c43cde75dd10c2c89ee3a3e0f1ebcd7244dd907449ffeaf6f48fcbd6ca49f7ef21f14cec64fe8ea395031b5c2e9ccc1235e66ba2a5b80d539aeee6237ccf9669229c30d57e5eb3c1d213cae0a42ea5a554c8d2ce333cf1080079e96e11ed308bea831d65af674e1c2581edad047a43aaddddd723161c8faa09e4945625eaabb6ae33c0b4ef91f76826e21b7802a4bdc47ab7f4d4a3de594a679141967e5c64d66c2bc8de779336b079737552c7489b9066a95d7d3d35a0c71840c191b645bcfe3a74c9c81120d323ea47f27c3270a49fedae4a8ffc0c9d3f5285c32d448230ff304577ab13970e5e8f833a9e869beb93f240ddf5a44bedc4c9cb43cddb6f722e8e28f67d55d359c8056ff841d3184411fa4e3c379c7b903b0a514f45efd0c6d86e0cc2625f37cbf1a5d272a61e422b02f7f669c9dd0f9cf5636ddabb25661c8d03b02204f13308de506c70f029a1cf34eff65fa80c2051225b10b1f962f47b23949802f7ce04fb09d8492a2602294b3301d823952b31379ebbecfbaa870233033fe5ed599ed3a0aa0e2fde477a1c4474e3fe5c3b61a06de888ac85da114610a683abbd9c00a3f99c31614d62156ff41ea5048f1f8a693ace082a4be7adece36dd2663c84ef00878b0f9bd5fd63703856c8e8984d63ebecfbb361e9ad515d74c0fa71d7657958627886782bce0cf1603e6a68fcb2a0810dd2335ccb8f5b32c0087e2421a3901e44148898ed8f134ac68d585836669a320816b3eab25f74d8e650a3524563acf36c51c28538226ceec0d274a7f91b76b6d0559b0e1cbd660941fae9fad147913be28f9ff3036475bebe5280a54fc19f0a5ebdabdf04df45b6ab9361ce6c3cb8def8e015fef1b3e53076bff1350c5ce7a90bff99a41ff4700a187d244ec49883a9e4dca1c7392a37432468e9ab9893019c273b98e4435b070075771124c3da9a25624ffc438d39f8c6fb657f6669e0c901abfa162acf5f4f45fbeea1b27a3e86d875604ff5c74061e187b14bb98942a17eaa917f93f20be80f36e69a89ad77df6b4403edcee9fc520f21ff78ef468b43c292ca09d80e9a1a71d7dc5a23377445d7417745b8bf82c7f6d326b1db916ed930e55c554a3a93d4d03900f2122047976d65e26ea666e4d01968c40efdd241604a32bed795a28ca4adddf117fc431cb275156fe8d5ac935941ad444bb7e085837f00ac4ad3b0eed3e7ed3c7b8722a594e8d2541d9420e7e799d8a5e19df608a85919f3316544e184ac18e4ccc3a75b84a3aaa1d20c5a2e36ab0d00639e18a1a810af584a7c825e8053c038290bb089c61a7a77a809d46d0cd645656d60dcdffaeb47cd50be4cf03e73ea800d725e37f5c40b84333050c1889a78fdc6d547957fce67214d4b904e5294e4c7a7290328164228b8b15ddb6c183c842ae4f6c50f284d43dcb07398fb4262b5a59b367b572f3d6ed43b574a240a1e807cd0d942c1dd8095599181906d6fab54b59cee50806f60cbe4f83b37ae141d36f1f98a6f9423746929545843b84244ea5345e6635b99d2b2b936f353bf7e14dc485a14aee3adb05758cca454f7d6294a1b786d5b8093c78389453862d4299a653584a1fdbcd7ad0f964edff395c0cdea8bf83701a2fc14aadc887987a1c0457e8d8cc5ef1e12650945bfeec9b0378895e6fb44d5a9ed8a904f4b4dd0f81d3ea650ed78dd4f9424c82656bcd92a23b869a733c99d95bef3db6dcc52623220b533ebc509cf45e0f1c3a5285324c0db9117ad4c8b6ddb4f549b18f87665d79176fdce733fbc14b44d8db1ad04a8e26c8da3955fb8c15f249a9d40103dad91c23dd8250c05274468db3774fefaa68969f5fd323f4b07c99a52e0e55f68d1f24ef76ca07f2621020f0a023b78ea372fad5af3c18b97024eff678846e83e44a5b7643453429c61b72e3caccc81359d7e2155e1266b8198e4caff37ad017c372cfeb9400be709cc34b17913e8c37fdc47b452ab5757b4f9851a4d9f6e3ca5c4c3af2991e979da7861ed3ec382722af63c4fae469679dfd2919337c4e21b5c8222f1d4dcd1aeebca5928ee36eb230c2ca4dffa6b21e8001e72287678d5ba8794b0b3fc5e5b4529c245eed8e71cc30133f6de4999f0af6c6553e99ba395a172716b6bd8a17b3b552d05ebfeace5857ad4e62b51bf26da23c9822f3ec525cb8161b5b8a1f301062c98cc4a7c57edfe6d3dec05accdd5a75a3d2d18645f7aa54fbc3f23e2e3b40786e0778801842e20ffb7249733cf03c9824e474427c2c38954564f5c3185d8b840a62a9c433438ca813997087d19df99cdf390f48d00d813cb69978cb1c2b1ffbe4376755048d93e91e9a6d8437eecea479a2ba57d6e1c140b1de054eb44a4e1c7491cf97366e3b6806e1708898cd7cfed2612449fe7fa85c5ea74411be690bb18c38051ea8081967044684c4be0454f0a6c5e20bc777c1395d0464f453fffd3d5bcf62f380cc7b5be1d658e9e78568246ccce5a99b56f965ab3044c5cc726b69e7a87c8e2d153847b22b8f401cfacc0110f1a908c3df8336662f214d1b29c9fb7735da6e7551be2a4ab856e225926caa3c247b025ea2440609f6e91399882ef76a02e2edc0987cdda0097c04b80204f65522fdc231a7ca486c748ab9502424375970284c1e96fc82236c2ccffd6d581899fcab5298354766812fbc4e0a215d4c1125c7c2bf20fc2ba54c39d89e4020d0777edc95645a842009438ae34f3ee031b499935a7a8e6f64b3acb4b58bcd04be416388481ca5f220b26257b4ceccf643194444ee15c693013340bda22425212540d8e7f8987820dcd9d33219c47d75f1b3f2dd744954afbefdd94a8faac97a4cd5ad733be96496d7a71cc8f2087f2210ab8b9fd2e1c279a9c86f2a282f330f699201dbf8dd4fca0169e249dc0e37e888a7a37f8d77760f4500b42fc80039a9cae29abd42fcd1fa387655f81cc7", 0x1000}, {&(0x7f0000000540)="cf9a110a732ad25745", 0x9}], 0x7, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0xfb}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @rthdr={{0x48, 0x29, 0x39, {0x62, 0x22bd, 0x1, 0x4, 0x0, [@mcast1, @loopback, @local]}}}, @dstopts_2292={{0x228, 0x29, 0x4, {0x5c, 0xa, [], [@generic={0x0, 0x49, "9bab0cdace4420065ca72dec862b623e76465869079321ee946e4ab4550b95609d0227ffd9f8e6efdea544aaaa25cc9cb818a561bf857df571d0d59d51891ed7510d81e9913be59ba1"}, @enc_lim={0x4, 0x1, 0x1f}, @enc_lim, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0xff, 0x3, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x67, 0x0, [], [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x7}]}}}], 0x158}, 0x800) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r3, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:01 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:40:01 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x5b6da7c84327f243) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000002) syz_open_pts(r4, 0x80440) r5 = openat$cgroup_type(r4, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) fallocate(r5, 0x40, 0x5, 0x1000) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) creat(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x2) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:40:01 executing program 2: syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000001c0)="31dd88e9cb2fda5852930f09f51afbe4e939e0d5ef3d9d3035a34df216c11036d92c9499f804f8e11639f21dd07870b45a0aaf2b6197f32728def41609a2de42780ff0dda1eba7a9031ddf0dd36c5a4176ea2c677264fe6167b6", 0xfde4) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x1000) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000040)) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r9, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r8, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r10, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32, @ANYRES32=r11, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10, r10}) 03:40:01 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x0, 0x7d53}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:01 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) r5 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40041}, 0x2000c00a) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r5, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000a40)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f0000000840)={&(0x7f00000009c0)={0x34, r5, 0x340, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0xfffffffffffffe14, 0x18, {0xf64f, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0xfffffffffffffe35}, 0x1, 0x0, 0x0, 0x4}, 0x44085) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r5, 0x10, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x49b4eb622e771ed5) 03:40:01 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:40:01 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)=0x32f) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x1, 0x2, 0xeb, &(0x7f0000000300)="4db8157111817a70d67de04e893eeadc1aa627e12b536de8320cb139c5b4c305dbc8822e1a16fc1f884ed5a814729829e36f76e6573b6cd1d22ad568edea6101b07979de5e2b1869af2a3bfa8f7bce457000c0d5460b1ee612db752bf67877811b36a36b3409693d4aa51c6f8f48db73c5b6e28b5023cc2eef970ebf085a8f151e0c5777ae81df817b699f9e4c63bde8a1557047283412b020b4c719d74a223600f9cc10544f8a67ed057cc076b1051d674028c83f7260ad206270bf801cc2bb5e0c457d52b86611e7ee876d720d9180c2f9c5d691cc5305394f7e555121c00841e3949cad35468dff9873"}) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x3, 0x4, [@link_local, @random="e87ff6e35018", @local, @broadcast]}) 03:40:01 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc491, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x4, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x81, 0x3, 0x5, 0x400, 0x20, 0x6}) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0x4200, 0x0, 0x0, 0x100078) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f00000000c0)) ioctl$TIOCNOTTY(r2, 0x5422) fcntl$notify(r1, 0x402, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfff, 0x52e7b238e49e5785) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)=""/171, 0xab) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000080)=0x8) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0xfffffff7, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:40:02 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_pts(r2, 0x2d4ec0) ioctl$KDSKBLED(r1, 0x4b65, 0x4) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x8) setxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='^wlan1ppp1vmnet1proc[em0\x00', 0x19, 0x4b9f6cc13002b50d) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:40:02 executing program 2: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f00000000c0)) ioctl$TIOCNOTTY(r2, 0x5422) fcntl$notify(r1, 0x402, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfff, 0x52e7b238e49e5785) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)=""/171, 0xab) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000080)=0x8) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0xfffffff7, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1d) sched_getattr(r3, &(0x7f0000000000)={0x30}, 0x30, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x42, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000000c0)=0x10000) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:02 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x0) 03:40:03 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x40, 0xff, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:40:03 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffe}, 0x0, 0x20000000001, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x400, 0x0, 0x8}, r2, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) setsockopt$inet6_group_source_req(r4, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x4e20, 0x109bcc4e, @local, 0x4}}, {{0xa, 0x4e20, 0x3ff, @local, 0xc3d2}}}, 0x108) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r9, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r8, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r10, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32, @ANYRES32=r11, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) setsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@remote, 0x4e22, 0x0, 0x4e24, 0x3, 0x2, 0x80, 0x0, 0x3a, 0x0, r11}, {0x20, 0xff, 0x20, 0x8073, 0x1c0000000000, 0xffffffff00000001, 0x0, 0x7}, {0x3, 0x80000001, 0x100, 0x72}, 0x5, 0x6e6bb4, 0x2, 0x1, 0x2, 0x6}, {{@in6=@rand_addr="516f44130313316bf4d5c96bc7462fdb", 0x4d5, 0x2b}, 0x2, @in=@broadcast, 0x3507, 0x0, 0x0, 0x8, 0x9, 0x4, 0x8000}}, 0xe8) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:03 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x302202}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x9455e46ac810ca1d, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, [], 0x28}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e1c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0xfffffffffffffdff, 0x2, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0xcc011}, 0x4040040) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) r5 = socket$inet(0x2, 0x803, 0xa0) r6 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000180)=0x54) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f00000002c0)={@local, @dev}, &(0x7f0000000300)=0xc) sendfile(r3, r4, 0x0, 0x80000002) syz_open_pts(r4, 0x80440) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000280)=0x5, 0x4) r7 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r9, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r9, 0x0, r8, 0x0, 0x1000000000000003, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, &(0x7f0000000340)=0xf, 0x4) setsockopt$inet_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "4ff76622b2e22d29", "8599eee4a184455b7e5c0da2a5d5d2dbfc35f4bfdd2c0366bbb1f7971852acde", "e36b9509", "5241cba6c90865f2"}, 0x38) 03:40:03 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x6}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000002) syz_open_pts(r5, 0x80440) r6 = socket(0x10, 0x2, 0x0) r7 = syz_open_procfs(0x0, 0x0) sendfile(r6, r7, 0x0, 0x80000002) sendto$inet6(r6, 0x0, 0xfffffffffffffe66, 0x20020031, &(0x7f0000000040)={0xa, 0x5, 0x4}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) getsockopt$inet6_int(r3, 0x29, 0x34, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:40:03 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 03:40:03 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:40:03 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82242040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r3, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x80010}, 0x20000000) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:04 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000100)=""/4096) 03:40:04 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe1e, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @empty}, 0x1c) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f646479daba8930303030303030303030303007303034303030302c757365725f69643d0c3943962f834cc6758ec144cbbb70481408f222c13f5752050168914663e8ee65abca6501000100fed24afb0b3dcd59c2dbd777897fbd50dc3908f73607d1b36536ed8e137794518b543e4c0c48ce896edc7ad3dce16650c7b94c01ded0349bcd06033b011044fde8f69a921ebfd6564ce9c4005bb81d3259bf8ddce891d18f92aac434a5ff19467f3c643e4ccb6b02d24b45afb318db04dc69d73c7f0b92b5efb6a4cc1000770572d1b7d21594fe190a97956a0192547395392bf840416cf1b471899a7f9bb41066cdb55ea9c83e1e0b8cf5c2255d56f49e2c04adf08da161dd478ca4f16adb57d03ba11ea2a78c159a5ae5e47104b62a06e8b8da2f9d49b5b3c7b76559a7d0c335841b1f9b0cc04703be579e8a4a745662d71266b7a455eeb4a1946d8941d8a068c30aec8ecb6a26308d309fed37a23d39753747cf3c0ce480172c5a845372b3211e870de1e3a954f179d44c297b4250f10411e7289afe155bf7832e88bd0cc3e02d55c10acf836eaf2296283c19d925e365a4b7ae6c741cc48fc21b716b364ae9c0c0bdae9e6fa9ea0c47c1e5955a15bb27b828a620358546b5b65f84d9a554e15817151050251ea9b0b90d1be4f46738900591fdc2ddd1d4e1d9e6a306c5207ec574febf3ae58b89d2c06add1567efc60170c3a48691fc2a4e45", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000340)={0x1, 0x2, 0x1000, 0x1, &(0x7f0000000200)='=', 0x1000, 0x0, &(0x7f0000000400)="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"}) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000180)='net/roude\x00') openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f00000000c0)={0x81, 0xff, 0x0, 0x4}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r7, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r8, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d060247a9d4c8eb091b98097e9b366704e3a80da4de819680beeffdffa8d23a3f77d7534f932fe753cd48311aff3841cf2905002211a2c6fa6668856f358c1f88b34c4116680d0bfc2687d55d6ec2ba5f05721ba4cb9c72dfa3514f421153f1fc8368a29fb384e96e2150ec8b43060fe515ae", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r8, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) pread64(r8, &(0x7f0000001400)=""/204, 0xcc, 0xffffffff) sendfile(r7, r4, 0x0, 0x7ffff000) 03:40:04 executing program 2: mlockall(0x1) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) r2 = syz_open_pts(r1, 0x80440) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x25401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(r2, 0xa, 0x18) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r3, 0x0, 0x7ffff000) 03:40:04 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x77359400}}) 03:40:04 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/186, 0xba}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/193, 0xc1}], 0x3, 0x873) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:05 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$pokeuser(0x6, r3, 0xfb, 0x7) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:05 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x102, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x180) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) 03:40:05 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000000000000000800"]) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r3, r2, 0x0, 0x7ffff000) 03:40:05 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) getsockopt$inet6_int(r2, 0x29, 0x9, &(0x7f0000000000), &(0x7f0000000080)=0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:40:05 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x600000, 0x832b86b8635ee79b) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) r3 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x9) dup2(r4, r3) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:05 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="aed9959016bac3e99acfdab34c91e191745356309f123df3eee1eab29ea0f3af78313d115c3a242c6110563b8a2ca79d46888c5eea19d3198eadd0d6aef5d5333d8b28a557aca533f7c21cc1b66d152c4e4a0e714eff938d59b5b0b5598a308afa2e1a23e396165a57a0028a4b93912c4fdaab6acf41c3950b7bf9f22fd61b9e3c048c4c9f383782d4e93df0eb72632aa33231797be3c60720211b2cf702f5d4a3639174b514d392b7b92d428cb45233bcadd8f811088e4ab992c2", @ANYRESDEC=r0, @ANYRESOCT=r1], 0xea) 03:40:05 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 03:40:06 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000100)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000002) syz_open_pts(r4, 0x80440) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x10, 0x0, 0x7, 0x40}, {0x400, 0x3, 0x1, 0x1}, {0x0, 0x40, 0x2}, {0x7fff, 0x5, 0x3f, 0x5}, {0x9, 0x5, 0xb0, 0x200}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:06 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0000004143c7511fce8c72dbc1d3d48ada9733081fcb55600a683214ac2133dee2225ae37f92ed8dd4aa7debb6371e8f00d4c0dbc083c9c6b2dfad8d0b66e7791290b37720815f474e6d549034cbad2c02c2f678a2f7c4938caf1ff76980aa4a2a545ff6dd6ff629c0b01ed724f33081a4e1c56b602d671fd46c3514cdfb61da4831d5a1efe746924fd85df8d3cc20d9dd298d8f30ca5a", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) r6 = socket(0x10, 0x2, 0x0) r7 = syz_open_procfs(0x0, 0x0) sendfile(r6, r7, 0x0, 0x80000002) syz_open_pts(r7, 0x0) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendto$inet6(r5, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r5, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) getpeername$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d3030301b303030303030303030303030303024303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fk\x00', @ANYRESHEX=r8, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r8, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r8, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES64=r8, @ANYRESHEX=r2, @ANYRESHEX, @ANYRES32=r3], 0x56) 03:40:06 executing program 4: r0 = socket$inet(0x2, 0x803, 0xa0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000200)=0x200) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet(0x2, 0x1, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendfile(r3, r3, 0x0, 0x7ffff000) 03:40:06 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000000)=""/133, &(0x7f00000000c0)=0x85) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) 03:40:06 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000140)={'batadv0\x00', @ifru_settings={0x2, 0x1cd4a453, @fr=&(0x7f0000000100)={0x8, 0x6, 0x7, 0x1, 0x7fff, 0x7, 0xff90}}}) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0xffff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r2, r1, 0x0, 0x7ffff000) 03:40:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="426f83ec013d30e8aff439a08bad1bb999beb15953ed177a9eca2201c08fc44ee60b5cb9388557c18f52d3afdddd7ba61f48cb50219211156d16ed219fbedbf9a1498c4d575378d2cec4d88e4c345a55b9aa4736590afd2c5aabd2b1c0017c38a5861fd1ce24dd9559f1b7c80f00681632b022b4394c65f722a8b52c60a345b783f083424f03abd4f44827643677af06639ec0c29eb2ccb59148d0e6214705a653f34be513e5e17f56e626e9f1f033db262064b0c92eba4bb4f7dcef2b51e605794cdd1fe9ae42df8618e9abbac9026c458450ea73eeb41411e77bdc509af376315426330d79b6daff716316", @ANYRESDEC=0x0, @ANYRES64=r1, @ANYPTR64, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYPTR64], @ANYRES16=r2, @ANYRESOCT, @ANYPTR], 0x139) 03:40:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) flistxattr(r0, &(0x7f0000000040)=""/134, 0x86) 03:40:07 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0xfffffffffffffe0f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000001c0)="b7c5fb905990753645f1464a3bdb6a33bbc8a5315699bf1d0549969a30bbc05d1933b6b2ef8f39426be132a2a2b050e903bf611f5e0192e4b8c21fe1a51e6de8a6fe320d7b30c3a0dc03ff7ac5b6852a61f4d5c82941145b8345f95e18060900279c76a044c87b199d70039bc794e2790f4617125c9f6b04", 0x78}, {&(0x7f0000000440)="9a02ae8f1836502fa74f78857da85fa128768fa00727c191c5b7af7b9a7f3fc1168a33efdaba8880bfb6030e2407b6401be812661759135cf85eeca060d12ed699fbd96d5dfd6b7dd3a5e63b833be7e5385f68f2e55c4203468d5dcc7bd969b2c764422da8261764766d168865b96b1bc4bd6821e7a56fb817fe59995af3e65429b59b7f0dae151c27bb5c015c7ea8f6192e252520cceeb5aa28408db51693b75ba8799a618170fda22bced7b4317284987af6d6346cb3004ca5ffcc33126bc9c9098d25ea9265614c50d61f5ce0072390ec854693f01164f0d50763a9180faef2920af763bdfcbd19aaed4e27b3f4a9b4", 0xf1}], 0x2, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r5, 0x7fffffff, 0x10}, 0xc) 03:40:07 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x101, 0x4, 0x0, "e27fe47ea4db7dad81be32e41cdfee4f", "c3bfe1779cbf7beed3f9ac66392cb11d3445a9910dcbeb6d0da296ae061e5b00ff6abe64ce6ad0fb97ddf3a52a2990240c226808aa906981074868bb4ea4018cad2221f85cfd742e6e4123014af31ff4ef3d5f3b374608e8e50f21f44a4a49449b2df23412ae408a0d1720c96e0f8b2b8eed5c7658ca69fe95a585783ddc744768a3ae237e3c8325e5d058de995033883ae0704bdd4caad7093dd64d2517029783a8fd69292fcc3fce6b3432c69d3ddc8267f9fff8e73fd63c20c8bc51f57ad106b70b35606fdde2af6bf86bf8ecd7163fc0a16df2d579165fa8cd69ed22f13a1670fa38e29dff0e9ddd1418"}, 0x101, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:40:07 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) socket$inet6_udplite(0xa, 0x2, 0x88) 03:40:07 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @timestamp, @sack_perm], 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000000)=0x3, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) 03:40:07 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'gretap0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x803, 0xff) getpid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r5, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r6, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r7 = fcntl$dupfd(r5, 0x406, r6) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(r8, 0xc0185879, 0x0) dup2(0xffffffffffffffff, r8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FITRIM(r11, 0xc0185879, &(0x7f0000000080)={0x0, 0x7fffffff}) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @multicast2}, 0x0) getsockopt$inet6_mreq(r8, 0x29, 0x9, &(0x7f0000006d00)={@local, 0x0}, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r9, &(0x7f0000007480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000007440)={&(0x7f0000006d80)={0x1c8, r10, 0xb16, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8}, {0x128, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff8000}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x600}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}]}}]}, 0x1c8}}, 0x2009c014) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r18 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r18, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r18, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r19, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r17, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r19, @ANYRES32=r16, @ANYBLOB="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", @ANYRES32, @ANYRES32=r20, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r22 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r23 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r23, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r23, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r24, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r22, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r24, @ANYRES32=r21, @ANYBLOB="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", @ANYRES32, @ANYRES32=r25, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r27 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r28 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r28, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r28, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r29, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r27, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r29, @ANYRES32=r26, @ANYBLOB="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", @ANYRES32, @ANYRES32=r30, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'nr0\x00', r29}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r34 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r35 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r35, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r35, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r36, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r34, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r36, @ANYRES32=r33, @ANYBLOB="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", @ANYRES32, @ANYRES32=r37, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockname$packet(r0, &(0x7f0000006080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000060c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r40 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r41 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r41, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r41, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r42, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r40, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r42, @ANYRES32=r39, @ANYBLOB="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", @ANYRES32, @ANYRES32=r43, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) sendmsg$TEAM_CMD_NOOP(r7, &(0x7f0000006580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd24e9cb97cf06d0d}, 0xc, &(0x7f0000006540)={&(0x7f0000006100)={0x408, r10, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}]}}, {{0x8}, {0x19c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x64a8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r36}, {0xb4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r38}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5b94}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r1}, {0x110, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r42}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}]}, 0x408}, 0x1, 0x0, 0x0, 0x2400c010}, 0x38ebeb1d9a45a65b) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r4, r3, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x0, 0x40, 0x900, 0x800, 0x10}) 03:40:08 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000002) syz_open_pts(r2, 0x80440) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000000)=0xb88f) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r3, r0, 0x0, 0x7ffff000) 03:40:08 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r3, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r3, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2040020}, 0xc, &(0x7f00000000c0)={&(0x7f0000002900)={0x2a3c, 0x18, 0x300, 0x70bd26, 0x25dfdbfb, {0x7f}, [@generic="c4e2d8287ede2ebb1247c54b0315ccd5c5b0a1ab0a95ce17b7480bfc595c5f4e9c3df952f5de1b55d4ad12067e5865644d98d2f88e9b887714954b8f9bd1aa1f5d7bef7153e293f50faa5409", @nested={0x444, 0x7b, [@generic="d7867ebf5cae7de8fa4bb376ea39727aea009006a6b593ecdf61ad32adb1b60306e107a186ac95717c022b5de449bfc2a06cd79e7abc67dd266638f79e21e0604c563728b1d61549e623251ea4c6bf68d35a88c7f4671cabfe01765e9a23330b00d16df7025b4730781b45645018d14ce6bb48", @generic="1c0de6744901588078e049f62f1176f8c892c07c75abdff87bf18f6b298a24481ab65543069d048fa5a05d33ddd2c3469f9141534daaf521f4601e03a1f95cec03b50330fc95a925f0a728a34115c7de32e4af66da7c5900d24c4691f86c64cc479eaa168033e715fca466da6d540ad65807665027cf845d193a9134dc65ae1ab5b6c1802298d679b5e35f555c01bc9c81cc5d3b97c0db88f12eb049e87907acc43c1c94cb5fceebdb457ac9a8e316821589bb2f9b281c615c16092524332de65bb95ef397a1897b61fb159c00cc1e", @generic="334c580cc7e492dafd0fc519d67aa673febe1d9c8e515b5a2505293f35c51e62d8800badfe1c1ef131bdc31410ef8f0dc76d9b50f17aff3ae8de2ac69e1b17b50709959a5b354d0cc33fff12be92a23e47adc4e034bb33f7134196c1a9da2a4e50e7d348cdc564fd3a713ab1225e80d2c61b65120305fbc70ced9e6d463922db41ae3ce0e127bf715fd065519036859e8a78c696dc27bd4eb66a4ad099cf0ee56228807370e4add58a006087a3f104d73c1cfa6bbb10d9423ab58bef4b35c8017aa3584a17b4a870f5a61aa704d26957920edc43ca705609e5f954e5d2640c12d95a8e1e54ad07301928dcae616ee879d7", @generic="b7b8e9d42a9f71b3ceff907a16dae209f56b0e570abff10a8e86630df68acc7dbff15869607bcf21c85362a1bfb13407d600cc455ab60bd0f4c9b2fdc486b3b95fb51f25d3395e4ac1a5610c10f2ca7f9ab03d9fa6bf7da48306f93e1c400033bb3b969a63fb68b0e8d4db89616ccb69a6f42406519b098a28c586284fc6466d6c01d165cfa8683d0c6a8ff9ee0b80b52ad551", @typed={0x4, 0x12}, @generic="5a0709688ee2db4a59c9461bff23a58f58194cbae0f46e19b486632869c5840315840b0968d324ce4383452a89c6ef8cb071f745dbaee7db4eebcc3276380270085cd01336bbe18637b618be6d8a35439dbd9d9ade65b9b11a03b6285a8d7633", @generic="0b867ce685b9764fc9ff2386f1d0f37b08070520ce84b552fa3972b882ab4e6dac67c0ada71053c0488d4ba706b11f08b248f5d6cd8c907e368b1103f3b145460f0299215209526e2c5faed01bbbcc294bf86d8c301c5fbfffa89354fafbab523ba78c9bb194f82c8a754dc818", @generic="a928143e2a8f48da487f0959ba014e4a0b7bda3e5046285ea95b73448a8af3032292bd792c9c775666895b7130290f39c0ad1b6bc754174e12e5250ccaae66cb4867a1a16eed9710f3dfdf5861c2502c8d50a29e494302d64bfbb2934a6713bf7c4419f5824e164961909bcaf487777ee5e449f421fe2a2c7b6e571a2a2f79bba079884c170cd540908403675c00ec7407e5ae", @typed={0x14, 0x28, @ipv6=@mcast2}]}, @nested={0x1010, 0x38, [@generic, @typed={0x1004, 0x53, @binary="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"}, @typed={0x8, 0x88, @pid}]}, @nested={0x1278, 0x22, [@typed={0x8, 0x87, @fd=r3}, @generic="99a01e3b52441a193c98d741f59a92ac450fc14f2696ebad1b50b9ec5ce05bbbfee0a7e548ae57a42c41ea7c031c4950a5f0052c4a857d7b57a427620e877c6862bda6e948840979d93da199b4a3861543a6d0d3eec134516430abc51dc02e94f6681c2b1be4b92be192991698b3cc3a066ea5a4d1c296b1", @generic="c84cd03f850d72fef26681ca284d3e0adea1623448ed4b8a862487f8537c88d3b1a18ca2d4b5748de8e82e6def938aa796162cfeb1ff37c1d5250c3a870a5f28655c0673c78ed70bccaa6e7abaabfaa06236edea716e932fff5f20420a9afed3b9cc83a8944ba0519bb02b78355e477dc7cd8fdfea8d3203c94606e0f6068a567739fa5e3ea06d8c91f9aed1a077709954954e6f310622c205e79827ae8e14", @generic="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", @typed={0x8, 0x5e, @ipv4=@multicast2}, @generic="fdadd984203247ffb94bbb2e031acab7b4f5d0bf3f7a2f9eb936931906f416f9710902d744578bdc8b1ed6143d8c03e7ab79c7c54bb4a96c3c49cddc587cc5765895932d59f90148ece332243c922ef73a468d94e63d8ade025985f1d04dfdbadf94251b0c8e2887ec89b72d45b835629ee79424981f6c9cc13eb451045664b9fd515e5e3192ece1fdd48df881876464e770fd", @typed={0xc, 0x3e, @u64=0x3}, @generic="ab5bb81b4d312ea2b4e07e275a4660e0d9a67373f5a7595aa17844ceaba9dd056cca6891e7735b67ad07383bba9bed10344a5ee95577f914530c57c4c3a2a4bfdd8ef0d7e481695fbbc36d500f37a5cb51a063d822e2e083636b69cd52ee81f21872502ce9234550cfa479335cf61dc3c6846433fb41c87dd6d044c9a4547ff73768ecaf6c1ab52c79d8affc5b2cf39119ed6241678094891deb01024b74bdd27b588bec31e1b5842918b930dd47"]}, @nested={0x310, 0x68, [@generic="7d9f6ade3923c5424b229eb4ef30b87896fe12ba7f43c81b89e3750e981c92fee3afb020aa8ed4494591dd2f077d599dcd372f83eef5b707f1c363bc3a41ce06c85337944a1e19ba076fa7800c227ec34895c8af1ff8797783f214645a17ff98b3c1d70e41eab26cb9b9ef7bb483f38554d8fc8ff4598a694137ea4ec56fdc302862a575e6c06d8ac8bfb35b536d4ee01057944815706d855fb7c992eb904faab0f95bfe54cfcb86337c8997c28183bff21d91d8c706e26be44fe3737557dad4e4fb7faf3171082b12d5ba43", @generic="0b337746166b657568c7ab1c49b9475286bacbc894a69bc1e41d343f5bb5b014223af9be22ab736fc8b4848f787ea781abb7deb6ccaddc1264df041de1054e603880726f2a1eb35364fb82b5b7bbe346b1e9a001e9ffd7cea4a7a7ba", @typed={0x8, 0x2b, @ipv4=@broadcast}, @generic="40858e5eba888443d0f562cb5cdce7f6fff4d4f688f8cd6fc6400fe1cb7a87a8f7bd61f59950592039a2ddbbe4bbae2001630ca941a913", @generic="9a55fca661564e2ef76d417f0be7ac82a6365ac187456c6715c5e3cf4cd34018996086ff23b488d2e8d233a12c2a0ce1295842f4712888", @generic="6c46cc0e7704f65a3bd7fb423f7cdad6e4383bc5516b9bfb9645916f735358aa4b217d8f168f7fe990e37bd0f28089cfce9672c620ced61c05f3fa554d4c48157c047db4a296f27194e547fe9a070014c3be2119e175287bb13b1dc39bb2d7c9e0482221b408aefb7a923241456020cc9ab7d6932addd5f2676287a002d01537e1319392430d16949303ed3a100c273b43a7372522c51f1949f0c5eb24726744e3e4a03e73ad3dee7528420dae61a6d62a1e799aec65abed1aef40caf41a5b16e4c908d1b638b5983b2783c9a9e4d91b425e3c122f11e7ba008a7bab9ce00b2675bed9a8b5", @generic="2550788e372fcad100249e539c944f2daaa519debcf87a68df5620ef73a1a9d9783a6ee8ac7be6f440", @typed={0xc, 0x4d, @u64=0xffffffffd7f3923a}, @typed={0x14, 0x7b, @ipv6=@mcast1}, @generic="a670bafdaeb87935f5d050500598b134e5223ce552d777621e3176607fb40416da000c5427659cf1f0c563b1ce32169097d74442e10cff060042b71d89a7"]}]}, 0x2a3c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x0, 0x1ff, 0xfffd}}, 0x50) write$binfmt_elf64(r0, &(0x7f0000001840)=ANY=[@ANYRESOCT=r0, @ANYBLOB="533a394f72f621f9e4a07169c387d4800f933c2820be5a3baba0d66165aac5c87bc1ef17bea40874fa5fd0bb363d4e0e454098e78d63839c31db65a8846d5eb599cce2ca4762b3f90f8c0426add8a402f705d692e0542cf299d80f4e00f4f9470cdd0500abf76afc8880cb1c0e88b8f55965b7edf472ab980c64528312934a20d83eae564468ab3211f4a3f325f84378d1f606483cc42b645042c80ed0d8444da8d47730fe09723d6e0df2becd1dacbcfd7e4856539a757f1650b2fb01c856a7981918e2656c6a6ba685cda95ac6b4790b94eb506db73d9f170dc637521c7f326704756d234ffffcbec12bc299581710dc1c083077549e40e0fca68226c1da5dafb5bc4bdfb8e74caa7ce66afa7fefd2155b40ab001df83d9d2816d3f18e15050fcaaafbfaf716289d9975441ec2d378fc2469ddcef4768217424cdc8fe625690523cdd91a8e08a6180bf6380e299644dd8d78da4c8186850daa646ba3ae4b830c62f51478cfe2c7e4f238ebb9bb863f7b1c351db35244568db9db176ac1e0d951830ce9b8d882fe529cf610aaef97e50dd4e4a991677417fb44a22c05ccd7cfba5cdcea5f66ddf1defd80c1f7687884806bce373486a626e7e75f51a192a374a8c5d1d5c1f8eb7b78b363f2305dc87b6a0806876c6ab0b05c36aa8ca7c0025ed637a5b6a71c77fa27978fda122015adb3312ff552fcfc63759631c05c42f525d71f47e89329417a4241dcdc51877b58bca46528120c377be25c4f7d02336174580a0e4538be4af5dc8fd813059eef29befa70f6e6ad1349a054ddfc4c93770612c9fbfedcdb585712be827deed2cd2ec75062b835ab41bf8d9bd6b86363f6ea7f17ddebd06e7a6a257f1428f3772f5a17498b16d2d31f6568bb549d967f8401016a33f4c2bbc63eb55e741255b8d0251ae96a9a4c3b74b4d9b7447b7d09a531b1f09f2c0c446184a3006b4f05a9cecfd591eebc3f8b5977caee4c80b6f1af8562856c792e9e822ea7b3036eda5a88fcda5fb3c5486c91f8e0ca3775867a7ea0ba195f4aef189dc1a5002ad084eb38d454dd80e27bd281c73cefa560b2566ebe822b622dffc5396b716854fedd09fff3a41f759b8208a958cbf53ddda4a82e1372d487ca957d77de01af05aa44b7ad6c08435b7bfd755d6103a2c62b3084d1572d33679445e5a9d20acb16775563a454221af972527b1b3854b941a93ec9307ce4839b41701df7ec3b7406d13853350c45bfc3dd08c8ab18923c5206b6087d3e24c144850de9fba928ddff726069f780266b4801e8383ede80013a04f87b22d549e7c3852955e28dc0d0ef52a5144d82be29cbecae92ca6f2e086c0ffe502cda31cba5678c22533d6a02d9063c3c302ba197a31fcb73f410e882ca6e30ba34d980e6486b9dcb6be394d7dae1651d608c759fc2f0b2642f9806472c309c5bbbf23030c7df4859c45fc5bdb19dc82bdaef29506296b4a6eb2153d0baf691807ea7b875f436946e84220c2ee76d3b6d23991c785bf335452dd315ab3cad6a471584a4aefa0298747084f8937dd94b463185895c29ba9042491f693c8c72b94a897b736a028c9c94f55e7a30969230ba21ec2149acae4ea899da488bf2090599c78e175405fc9c52be88a86b5057a4a6313b3895b72a3221329cfd05d94c06d76f0949216925dc408f509d037e28d6c6aaea26ac9ff8316a147029968952b69cffcd9a9c149b5a29fcefee42315f872daa4423bce1783a97b0bbf9bea06f85c13e3296d48c65db92b1aa6e5c95202700e04ec3eb8195a7127f459bd85258ea0a4f117d14ccce3513e8d399719731d96a2b90831fec076aa1d08e4d123e688e78b03c7596c9913536d592d4573f9450197d58066b3b3ca3266665ec43a46de8b90ddeb27cc34b0bd207d3d3407bc098a31b6a61249076d4193bac749ef32f2fba04b3b0eb8a297fcaadba87bd3b697cb83d2d9be906859545edc153b70d3a3a5fce94c1a814412bc6879a8a4e3537c0b206d0d272d00272fab3c12a6e9680dc76fe5f6ea029fd10dcf43d67137c2eafaa2c92244393bca0f879e40adfacbdf107428e6dc1ee1016285750e42f67c1a6eca9448d5d791c6406418f2c4148e868046ccf056742ef623541d898f83001d97d41649dded5749d197132aba8618e9b49d629358671aaea89a03f158a2bf86c388d0d3b48007a60ff8216dc0580968206455c5b29867829bedf3a9127187ba5bfa352d418b695042a47bd159ec56f4e85f2fe3f4ed7d9080f09fb3cc725098b4846837d746c76b03b6a0d1b0070171c54964b9a2903d8d098790169263cbc5b0aa92d0413813ecf6beb018b41b4cceafa60f5a38f1f9af31a67f9f03b2448a85ef8ea0c1d9c498659999d46c6fb9f7ed636aa7ecd756876e27fac54a748e2c60efb87bc985aba3f5afb5d79f486357838269ffc27cf2f509657f314a071dd7713f363d8196f3cb9af039fdbd7396d5a6d7ac0999259156f238ee9fb7c99ed8f9a3fa464bd92741095d23fdd724536d948878b850604b2b52d6a0f3629d138544633fcd5d57fa215fffac9d69edde1946c0627aa4fe45ba35def71590d6407c32c4a69193da1c010d979d8f932979e3ce3f13927607e9128b6d4b51aaabfec702ed3b5eac0e47eec8754a4d48f1f1014da5ac3984a43a28a980e047fb232498247e41a6a87306d7aa027c713a88fca340c471fc4cea4b775a4febf58cad504e568526660dfccc3c05a7f543d94a80c02b63daa66d068a71b8d2c6dddc1869442994097ce0e434982b28ff44a47d7779dcbc2ab7247c1d984ed15831ab45e03eeb566c18802ac65753e57aaab21dbac3c45a7b50cec5b9b02404a8ded100ef91f613e4d336994cc0f22e4b95892fd76638df9ae458dbba35105d239535aa0f4e105daabce18c3a4ab2f1175eee2e7c33f97d4a1bec3e695cb6d4fdff93e6083ce3db09385236c4861e4ed1bb3a2f6cd0c2ffb50d15c2c03f652b212d12933701b7d488f18fcd51cab9ae97f5e7b395b364757093c5b6bce088cc76a2fff878c49a1e8950b99c4a4a10dafeb09ff48b450c8a43f43f0ff592c59dbb9ee2c23358ad75e1c377a63a9e1bc62135e1d3a248ad86691b538b9d4d2ca55bb1b629e34554839bb1fd34618e3869a476e4dd9a3e8d8e4dac0d1e713e2fcb3f81a8704338247f9c6bef48591456feea0c5ce8148fd4eab0a51a89d9f7fdd3747e6cf6a830b3530b4d2a835e1f49cdd9053e9b08ccf560bbc1aa8d10bae8ecf3861a075c4845e14b5469f47fbfd4c624b2eda8f192d08a4d7d29e48143b0222261560c05ed733fbadbb2e009f45ce0c2bb632abbbf148fe4926de39db6cf0cee9984d8f85674bd45f0e64d13d98c891908416600cb9a209cd951caf8b4916aa1fa92fb38da16a432ddebbfd81cd02559e080ce11b03000000e5eff46701917e08f96e070ce19a31be7de4b11032a632d5eb85ca5f197c11857db60b8c5fb6727cbe1d0aab525d8e515299b6a55c266f294a3b73b20eaf0cd1056275d0b1f28a1afaa0975ceaccf24f61f03f61b40ac3c7a1aa51383fca66bd9463abfb36432e466b9ad367b150b50ce91e6c5df9ff3174dc8edc6d3948e096853b50516f210abb52da7df22610eddaca5ef254be3d8219803918128f460a87fd0879cce812d07d008cdd7ece94c92dd97f04bd5293adce48f10dfca37ee8079916c902e08f5cfa3cc52cca1c2f9632b3baaa49fe50aa267b95c3f21361fa1aedc90722426a02e5ea250b4111934ed7e659c15bba5b8b980291f3f325760b01f0c450c8ee1de14fdc6990af59a9e34eb65138564cefac32abef3b133cdcea031aa9e8a862e4b804fe1ef6e6dd610b298252d2b7264936d0f8f87840f2aa66caacbd68bf3224919e29d2c7bc54f744176bc90717dd61dd941a4355e7248f0c3540614a6bbb90c3b2f3c4e0dc0f9ee69e37f80d8cb798578d64a6bf5d3f18e26a44a2f23e284fba4dd77ac331b57303ff6acb5433d7096978082b7e66cb0bebaeabb172d55072369da0846c9b59880dc87b8299be3bd7b3954b82d5dbcc7a9e1ad6761e849b89db939db2751832d433bbb0cff8be9fbd20b0e4ec51fb2028ebb0db85c659d8cd890cc7f1594851281741b935c4046fa4b630bf7a3f3949b66b21762f6dfc5edd82a1f9c2efca262023c72ff0649596fa499881872482f858f3092def2da4471ad945803a75a35f113cf867ebe78071f4743d1a5f2baf89e62fa14632dd1ccdd168e000ab861aaa35d74585a93e36c287c29aab0beec00c1d8a2907603109a85c69d602214f3682554d891af1727c11ed66ae38be23f9582124635443846d432a1416aa6f5111bbcd693404fb484f65977905894a2cd2e0c1450862e09c052562246319a0886833be5a4c9feb1327df1439d748f2bdac65c045a12c267ecf016a1e1e301fe9862b8286883842d41883ccfeb7227a20af61126bb8f6002067dfa979728a61df780c0e02b60fcdd984965be70a45e003e88e5baf14493201ac173f22b7bd9df80dcd13e444a07aecbf8f0babca9206bf93490e28bddef8f34425f2f5855dad5241b18e8aa6c4d7382cf5f14155da442d88045a2b2ac26e0d2aeb73da5f6326a13d43d8be16fa078d987758696a71f39eab90b637c809d6712c54a4d79f033cbb4769ef6b407b40b67df8558f15c63e358c136d596733029ad561caf264cd2ea4005b634ba7b626faabb679fa0c0e23af44bc219715f16dba7a74f636a2d7500780c925d9b0d269f87a6603f63ea66e88acf73ff49aaee956cfb8a3c62d9b28cecd4b4c5e7d9a39b3356758f783c5ef7d289f0dedca2b2b80fc673d1ad531e5abd5226512d5844a34f8714821829e09c8ab83f7bdae6882a32af6ccf8888eb27b5d719b242b96e3f13c84cad46d399278c5876c2ebabbbffe87496a9f497d071ff1677ccad98cd6b7930246a2d972afa973699d3f652b8a3111fa7efd0946348c7eb01b9be45f86737ccfa1a499d9a25febf4aef934456704eb75fafa632d60bec5ccb37e66b96e6b08279d3c582727beb49f5cf89830a9e5fe98d29a0f4f3be1959d4f66c0521b820bc9d6080cc4f9dd2ee68a0491d99342c87c1e59fbb8943d5a7a94671dbf30a37d023790e2aec511139e534ee1100373a0d7d0d9f95ff6a50a0245c90e8c216668bd1e52ffebbf2226ee6fafb3c01ea6f6607c6fa2f2170139f60841f2c5747be694e043a3205eb78c97686e74b621505a5b95ac3a222672fb69de445d997baa833f30a4417b4c5ee11eb73d505114b2f2a7a2e8048d2219a3470df467fc8fd882544722c2c39db68103d234c0daad3d963c7bb82d3b5227b5826b534f33050fc76ce28843e94a1d1bda602fe41760338abcf1596136d1b02cfed8f29aaf322793f720c48c6aecf407d4f5705c5fadb291fb1c239a067a6870422a03bc7069d6dbefda2775537dc3e5efc879282f60456e7ea3366c3365362006a5a1fe99672bba21e689caef573fce11b15d71f3315cf721d9d6941f690d7a020994ca22c7816bf667e59f379582b8785bacfd1126f6c833af83202d90bf7e8a391666d9bbca5c705b897dc6a15bbd5a8e1e335f80eef0ddcb831af428df81b1711840deae9bb75d51d353a9abd2693b5d78f247f04b6226065d3f6a4a19a92d7d34d78a054a1a4b9e25aef30b4bb8b135d820937d8c40c06f1d54a76f73d9e616a8b90b0ea6afdf5efd573703fdabac3f19bcd1d62f0594656b17f565a78eb6ff8bc6c7089db754905f92f4af9738992d93ae94f47f9255895525f2d4d04670f99cc26ee1adc8d05db5d7f97770ac959abc31cfb66dd1b6462c820a379f82fabe26bcf2a719ed33c596f47f0a8c2ae6689bf86e7ebf0d4898fa22205159ddcc94e3f508e2ad1baa75b4ec476b89dc3a7c21b22a981fb6e2339a", @ANYRESDEC, @ANYPTR64, @ANYRES64=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r2], 0xffffffbf) 03:40:08 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x3f) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @loopback, 0x2}, 0xfffffffffffffd08) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000002) syz_open_pts(r6, 0x80440) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='smaps\x00'}, 0x30) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x1d) r8 = socket(0x10, 0x2, 0x0) r9 = syz_open_procfs(0x0, 0x0) sendfile(r8, r9, 0x0, 0x80000002) syz_open_pts(r9, 0x80440) perf_event_open(0x0, r7, 0x7, r9, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r11, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r11, r10, 0x0, 0x7ffff000) 03:40:08 executing program 1: syz_open_procfs(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x803, 0xa0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) connect$inet(r2, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x96) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) sendfile(r1, r0, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 529.023523] syz-executor.1 (1405) used greatest stack depth: 21848 bytes left [ 529.239547] lowmemorykiller: Killing 'syz-executor.2' (1417) (tgid 1417), adj 1000, [ 529.239547] to free 71596kB on behalf of 'udevd' (23429) because [ 529.239547] cache 65460kB is below limit 65536kB for oom_score_adj 12 [ 529.239547] Free memory is -4992kB above reserved 03:40:09 executing program 1: syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x3) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x803, 0xff) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1d) getpgid(r4) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1d) ptrace$setopts(0xffffffffffffffff, r5, 0x4000000000001, 0x21) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r6, 0x5422) sendfile(r3, r2, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) [ 529.275073] lowmemorykiller: Killing 'syz-executor.4' (1430) (tgid 1430), adj 1000, [ 529.275073] to free 61500kB on behalf of 'kswapd0' (33) because [ 529.275073] cache 62956kB is below limit 65536kB for oom_score_adj 12 [ 529.275073] Free memory is -3008kB above reserved 03:40:09 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr, 0x3}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000003c0)=0x40003, 0x4) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r3, r2, 0x0, 0x7ffff000) [ 529.280563] lowmemorykiller: Killing 'syz-executor.4' (1373) (tgid 1373), adj 1000, [ 529.280563] to free 53296kB on behalf of 'kswapd0' (33) because [ 529.280563] cache 62904kB is below limit 65536kB for oom_score_adj 12 [ 529.280563] Free memory is -2728kB above reserved [ 529.280572] [ 529.280574] ================================= [ 529.280575] [ INFO: inconsistent lock state ] [ 529.280581] 4.9.194+ #0 Not tainted [ 529.280582] --------------------------------- 03:40:09 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) syz_open_pts(r3, 0x80440) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r6, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r5, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r7, @ANYRES32=r4, @ANYBLOB="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", @ANYRES32, @ANYRES32=r8, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000280)=0xfffffffffffffff6) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r11 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r11, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x4c2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg(r11, &(0x7f0000005040)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r12, 0x1, 0x0, 0x6, @link_local}, 0x65, 0x0}}], 0x400000000000039, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r10, &(0x7f0000000800)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0200001600000427bd7000fedbdf252975b3de79bb3f8b37d673207982f320ff0100000000000000000000000000014e22ff804e21000011f70040", @ANYRES32=r12, @ANYRES32=r9, @ANYBLOB="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", @ANYRES32, @ANYRES32=r13, @ANYBLOB="00000000000000000000ffffac1414bb000004227700000000000000000000000000ffff7f0000010080e9ffffff000009000000000000000000008000000000610b000000000000ffffff7f000000000200000000000000020000000000000003000000000000007d09000000000000000001000000000081ffffffffffffff320200000000000005000000c70f00003a9700002dbd70000800000002000008400000000000000008000b00040000000c001c00", @ANYRES32, @ANYBLOB="0100000008001d00f8ffffff"], 0x9}, 0x1, 0x0, 0x0, 0x24000c00}, 0x40) write$P9_RSTATu(r3, &(0x7f0000000100)={0x64, 0x7d, 0x2, {{0x0, 0x45, 0x1f, 0x8, {0x8, 0x4, 0x6}, 0x92050000, 0xfffffff8, 0xccd, 0x1, 0x6, 'smaps\x00', 0x6, 'smaps\x00', 0x6, 'smaps\x00'}, 0xa, 'vmnet1ppp1', r8, 0xffffffffffffffff, r9}}, 0x64) [ 529.280586] inconsistent {RECLAIM_FS-ON-W} -> {IN-RECLAIM_FS-R} usage. [ 529.280592] kswapd0/33 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 529.280612] (&mm->mmap_sem){+++++?}, at: [<0000000095dbd566>] get_cmdline+0xa3/0x2d0 {RECLAIM_FS-ON-W} state was registered at: [ 529.280622] mark_held_locks+0xb1/0x100 [ 529.280628] lockdep_trace_alloc+0x18c/0x2b0 [ 529.280638] __alloc_pages_nodemask+0x143/0x1a80 [ 529.280645] __pmd_alloc+0x4a/0x330 [ 529.280651] move_page_tables+0xadb/0xd60 [ 529.280656] shift_arg_pages+0x1ae/0x470 [ 529.280661] setup_arg_pages+0x60d/0x7c0 03:40:09 executing program 3: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x281}, "c7a6329e8ba69822", "8a2fa88d6c9ecaf290ee292787c82b77", '\tAX6', "29a0465f660b0717"}, 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000002) syz_open_pts(r4, 0x80440) ioctl$KDSETMODE(r4, 0x4b3a, 0x81) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r2, r1, 0x0, 0x7ffff000) [ 529.280669] load_elf_binary+0xa84/0x4a90 [ 529.280674] search_binary_handler+0x14f/0x700 [ 529.280680] do_execveat_common.isra.0+0xf81/0x1db0 [ 529.280684] do_execve+0x3a/0x50 [ 529.280692] run_init_process+0x33/0x37 [ 529.280698] try_to_run_init_process+0x18/0x48 [ 529.280706] kernel_init+0xf2/0x163 [ 529.280710] ret_from_fork+0x5c/0x70 [ 529.280712] irq event stamp: 251753 03:40:09 executing program 4: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r0, 0x0, 0x7ffff000) 03:40:09 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x9}, 0x28, 0x3) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000c00)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18700, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r1, 0x0, 0x72439a6b) socket$nl_xfrm(0x10, 0x3, 0x6) creat(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @local, 0x0, 0x6, 0x40, 0x900, 0x800, 0x10}) [ 529.280720] hardirqs last enabled at (251753): [<00000000d40929bf>] _raw_spin_unlock_irqrestore+0x5a/0x70 [ 529.280730] hardirqs last disabled at (251752): [<0000000034223c67>] rcu_read_unlock_special+0x3a/0xb30 [ 529.280739] softirqs last enabled at (247090): [<00000000627f674e>] __do_softirq+0x474/0x964 [ 529.280747] softirqs last disabled at (247083): [<00000000625d6fda>] irq_exit+0x119/0x160 [ 529.280749] [ 529.280749] other info that might help us debug this: [ 529.280750] Possible unsafe locking scenario: [ 529.280750] [ 529.280751] CPU0 [ 529.280753] ---- [ 529.280757] lock(&mm->mmap_sem); [ 529.280758] 03:40:09 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2ab02) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000040)) socket$inet6(0xa, 0x800, 0xff) socket(0x10, 0x803, 0x0) socket(0x10, 0x803, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() open(0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="478900cd48"], 0x4}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="04000000000000007eae0b9afbfa1d00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r4], 0x2c}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x0, 0x120, 0xffffffffffffffae}, 0x20) tkill(r3, 0x38) [ 529.280761] lock(&mm->mmap_sem); [ 529.280763] [ 529.280763] *** DEADLOCK *** [ 529.280763] [ 529.280766] 1 lock held by kswapd0/33: [ 529.280780] #0: (shrinker_rwsem){++++..}, at: [<0000000025be8807>] shrink_slab.part.0+0xb2/0xa20 [ 529.280781] [ 529.280781] stack backtrace: [ 529.280788] CPU: 0 PID: 33 Comm: kswapd0 Not tainted 4.9.194+ #0 [ 529.280801] ffff8801d8427420 ffffffff81b67001 00000000000000f0 ffff8801d8418000 [ 529.280811] ffffffff83cb1200 ffff8801d84188f8 ffffffff84252000 ffff8801d8427498 [ 529.280820] ffffffff81408710 0000000000000000 ffffffff00000001 0000000000000001 [ 529.280821] Call Trace: [ 529.280831] [<0000000052c739a6>] dump_stack+0xc1/0x120 [ 529.280841] [<00000000258c1635>] print_usage_bug.cold+0x452/0x5a2 [ 529.280848] [<00000000353ac7d0>] mark_lock+0x6c7/0x12e0 [ 529.280855] [<00000000cde78f09>] ? print_irq_inversion_bug+0xa0/0xa0 [ 529.280861] [<00000000a9a2a274>] __lock_acquire+0x5be/0x4390 [ 529.280869] [<000000001a8d5b6f>] ? trace_hardirqs_on+0x10/0x10 [ 529.280875] [<000000001a8d5b6f>] ? trace_hardirqs_on+0x10/0x10 [ 529.280882] [<00000000c0eff44a>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 529.280889] [<000000001a251c45>] lock_acquire+0x133/0x3d0 [ 529.280895] [<0000000095dbd566>] ? get_cmdline+0xa3/0x2d0 [ 529.280901] [<000000003b22690e>] down_read+0x44/0xb0 [ 529.280907] [<0000000095dbd566>] ? get_cmdline+0xa3/0x2d0 [ 529.280913] [<0000000095dbd566>] get_cmdline+0xa3/0x2d0 [ 529.280923] [<00000000eb0c4ae0>] handle_lmk_event+0x169/0x920 [ 529.280929] [<000000009323d5d6>] ? mark_held_locks+0xb1/0x100 [ 529.280936] [<00000000c8be2ea5>] ? lmk_event_show+0x390/0x390 [ 529.280943] [<00000000ba066e31>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 529.280950] [<00000000c0eff44a>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 529.280957] [<000000004b951139>] ? rcu_read_unlock_special+0x6cb/0xb30 [ 529.280966] [<00000000503d0ab4>] ? check_preemption_disabled+0x3c/0x200 [ 529.280973] [<00000000503d0ab4>] ? check_preemption_disabled+0x3c/0x200 [ 529.280980] [<00000000eb379b24>] ? lowmem_scan+0x6ae/0xb70 [ 529.280987] [<00000000e076d630>] lowmem_scan+0x6f3/0xb70 [ 529.280994] [<00000000c07ca406>] shrink_slab.part.0+0x3cf/0xa20 [ 529.281002] [<00000000000ec8fb>] ? unregister_shrinker+0x230/0x230 [ 529.281009] [<0000000073118f6f>] ? _raw_spin_unlock_irq+0x39/0x60 [ 529.281016] [<0000000082169a30>] ? finish_task_switch+0x1e5/0x660 [ 529.281022] [<0000000023f17377>] ? finish_task_switch+0x1b7/0x660 [ 529.281028] [<000000003aed892a>] ? __switch_to_asm+0x41/0x70 [ 529.281035] [<000000006b05cf02>] shrink_node+0x1ed/0x750 [ 529.281044] [<000000004e25d871>] ? shrink_node_memcg.isra.0+0x1360/0x1360 [ 529.281051] [<000000000c5e36f4>] kswapd+0x7f8/0x13b0 [ 529.281059] [<000000004040784b>] ? try_to_free_pages+0xbd0/0xbd0 [ 529.281067] [<0000000020243f58>] ? autoremove_wake_function.part.0+0x130/0x130 [ 529.281076] [<000000009170396f>] ? __kthread_parkme+0x173/0x240 [ 529.281083] [<000000004040784b>] ? try_to_free_pages+0xbd0/0xbd0 [ 529.281090] [<000000006bd530c8>] kthread+0x278/0x310 [ 529.281097] [<0000000082ad18c8>] ? kthread_park+0xa0/0xa0 [ 529.281104] [<00000000c0eff44a>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 529.281111] [<0000000073118f6f>] ? _raw_spin_unlock_irq+0x39/0x60 [ 529.281117] [<0000000082169a30>] ? finish_task_switch+0x1e5/0x660 [ 529.281123] [<0000000023f17377>] ? finish_task_switch+0x1b7/0x660 [ 529.281130] [<000000003aed892a>] ? __switch_to_asm+0x41/0x70 [ 529.281136] [<00000000f776ca1e>] ? __switch_to_asm+0x35/0x70 [ 529.281142] [<000000003aed892a>] ? __switch_to_asm+0x41/0x70 [ 529.281149] [<0000000082ad18c8>] ? kthread_park+0xa0/0xa0 [ 529.281155] [<0000000082ad18c8>] ? kthread_park+0xa0/0xa0 [ 529.281162] [<0000000002461339>] ret_from_fork+0x5c/0x70 [ 529.449540] audit: type=1400 audit(2000000409.080:34): avc: denied { getopt } for pid=1406 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 530.115876] syz-executor.3 invoked oom-killer: gfp_mask=0x27080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOTRACK), nodemask=0, order=3, oom_score_adj=1000 [ 530.115885] CPU: 1 PID: 1475 Comm: syz-executor.3 Not tainted 4.9.194+ #0 [ 530.115900] ffff880004dff7e0 ffffffff81b67001 ffff880004dffb38 ffffffff833f1c30 [ 530.115909] 00000000000003e8 ffff880004dffb50 0000000000000003 ffff880004dff860 [ 530.115918] ffffffff81506e44 0000000000000003 00000000000003e8 ffffffff8282ac45 [ 530.115919] Call Trace: [ 530.115933] [<0000000052c739a6>] dump_stack+0xc1/0x120 [ 530.115944] [<000000001a8d2c76>] dump_header.isra.0+0x142/0x74c [ 530.115953] [<0000000014a08a28>] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 530.115962] [<0000000099b3f96d>] ? ___ratelimit+0x55/0x413 [ 530.115969] [<00000000941131fc>] oom_kill_process.cold+0xd/0xa74 [ 530.115979] [<000000006b5f65f2>] ? has_capability_noaudit+0x25/0x30 [ 530.115989] [<00000000d2731656>] ? oom_badness.part.0+0x11d/0x600 [ 530.115996] [<000000002da36c49>] ? oom_badness.part.0+0x12f/0x600 [ 530.116002] [<0000000027bd1b19>] ? out_of_memory+0x6d3/0xea0 [ 530.116009] [<000000003df52a24>] out_of_memory+0x29b/0xea0 [ 530.116016] [<00000000068d0e02>] ? out_of_memory+0x41c/0xea0 [ 530.116024] [<000000007d8372f8>] ? oom_killer_disable+0x210/0x210 [ 530.116031] [<00000000e498cb3d>] ? trace_hardirqs_on+0xd/0x10 [ 530.116038] [<0000000006d18186>] ? __alloc_pages_nodemask+0x10d0/0x1a80 [ 530.116044] [<000000000150cc06>] __alloc_pages_nodemask+0x1730/0x1a80 [ 530.116056] [<00000000087c8f28>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 530.116064] [<00000000657c8cbe>] ? copy_process.part.0+0x1714/0x6690 [ 530.116072] [<00000000657c8cbe>] ? copy_process.part.0+0x1714/0x6690 [ 530.116079] [<00000000dd638285>] ? kasan_slab_alloc+0xf/0x20 [ 530.116086] [<000000008c402d48>] ? kmem_cache_alloc+0x155/0x2b0 [ 530.116093] [<00000000a5f7330f>] copy_process.part.0+0x2da/0x6690 [ 530.116101] [<000000000552c86f>] ? SyS_mmap_pgoff+0x1b0/0x1b0 [ 530.116110] [<00000000503d0ab4>] ? check_preemption_disabled+0x3c/0x200 [ 530.116117] [<0000000091f8b18a>] ? __lru_cache_add+0x18c/0x250 [ 530.116124] [<00000000ff8986ae>] ? __this_cpu_preempt_check+0x1d/0x30 [ 530.116131] [<000000005e75c462>] ? handle_mm_fault+0x501/0x2420 [ 530.116139] [<0000000050574d9d>] ? __cleanup_sighand+0x50/0x50 [ 530.116146] [<0000000005fb7ac7>] _do_fork+0x1c1/0xd50 [ 530.116153] [<00000000401d6447>] ? fork_idle+0x280/0x280 [ 530.116160] [<000000000ac243fc>] ? __do_page_fault+0x41e/0xa60 [ 530.116166] [<000000003741da4d>] ? vmacache_update+0xfe/0x130 [ 530.116174] [<0000000063045d1f>] ? up_read+0x1a/0x40 [ 530.116180] [<0000000012cf2b85>] ? __do_page_fault+0x545/0xa60 [ 530.116187] [<0000000050f41ce5>] SyS_clone+0x37/0x50 [ 530.116194] [<0000000058f15c08>] ? sys_vfork+0x30/0x30 [ 530.116202] [<00000000834d9b0a>] do_syscall_64+0x1ad/0x5c0 [ 530.116210] [<00000000d61a7bd0>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 530.118069] Mem-Info: [ 530.118087] active_anon:111742 inactive_anon:1350817 isolated_anon:0 [ 530.118087] active_file:57 inactive_file:169 isolated_file:0 [ 530.118087] unevictable:27100 dirty:46 writeback:7 unstable:0 [ 530.118087] slab_reclaimable:9506 slab_unreclaimable:63721 [ 530.118087] mapped:65833 shmem:48 pagetables:12811 bounce:0 [ 530.118087] free:6626 free_pcp:51 free_cma:0 [ 530.118100] Node 0 active_anon:446968kB inactive_anon:5403268kB active_file:228kB inactive_file:676kB unevictable:108400kB isolated(anon):0kB isolated(file):0kB mapped:263332kB dirty:184kB writeback:28kB shmem:192kB writeback_tmp:0kB unstable:0kB pages_scanned:79 all_unreclaimable? no [ 530.118119] DMA32 free:18704kB min:4696kB low:7712kB high:10728kB active_anon:110460kB inactive_anon:2757664kB active_file:136kB inactive_file:44kB unevictable:20100kB writepending:24kB present:3145324kB managed:3020092kB mlocked:20080kB slab_reclaimable:13184kB slab_unreclaimable:64416kB kernel_stack:6528kB pagetables:20936kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 530.118144] Normal free:7800kB min:5580kB low:9168kB high:12756kB active_anon:336508kB inactive_anon:2645604kB active_file:228kB inactive_file:668kB unevictable:88400kB writepending:188kB present:4718592kB managed:3589312kB mlocked:88328kB slab_reclaimable:24840kB slab_unreclaimable:190468kB kernel_stack:10624kB pagetables:30308kB bounce:0kB free_pcp:204kB local_pcp:180kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 530.118191] DMA32: 127*4kB (UME) 46*8kB (UE) 8*16kB (UE) 3*32kB (UME) 1*64kB (E) 1*128kB (U) 12*256kB (UM) 2*512kB (UM) 1*1024kB (E) 2*2048kB (ME) 2*4096kB (M) = 18700kB Normal: 160*4kB (UM) 155*8kB (UME) 144*16kB (UME) 92*32kB (UM) 4*64kB (M) 2*128kB (M) 1*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7896kB 13787 total pagecache pages [ 530.118233] 0 pages in swap cache [ 530.118237] Swap cache stats: add 0, delete 0, find 0/0 [ 530.118238] Free swap = 0kB [ 530.118240] Total swap = 0kB [ 530.118242] 1965979 pages RAM [ 530.118244] 0 pages HighMem/MovableOnly [ 530.118246] 313628 pages reserved [ 530.118248] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 530.118270] [ 470] 0 470 5365 180 17 3 0 -1000 udevd [ 530.118279] [ 1760] 0 1760 2492 573 9 3 0 0 dhclient [ 530.118288] [ 1891] 0 1891 14231 120 23 3 0 0 rsyslogd [ 530.118297] [ 1946] 0 1946 4724 63 15 3 0 0 cron [ 530.118306] [ 1964] 0 1964 3767 78 11 3 0 0 mcstransd [ 530.118315] [ 1966] 0 1966 12926 1238 27 3 0 0 restorecond [ 530.118324] [ 1992] 0 1992 12489 179 29 3 0 -1000 sshd [ 530.118333] [ 2022] 0 2022 3648 51 12 3 0 0 getty [ 530.118342] [ 2032] 0 2032 17820 213 40 3 0 0 sshd [ 530.118351] [ 2034] 0 2034 125966 92315 209 5 0 0 syz-fuzzer [ 530.118360] [ 2091] 0 2091 18114 241 23 3 0 0 syz-executor.5 [ 530.118370] [ 2096] 0 2096 18114 241 23 3 0 0 syz-executor.4 [ 530.118378] [ 2097] 0 2097 18113 8955 24 4 0 0 syz-executor.5 [ 530.118386] [ 2107] 0 2107 18113 8970 24 4 0 0 syz-executor.4 [ 530.118396] [ 3752] 0 3752 18179 13203 32 3 0 1000 syz-executor.5 [ 530.118404] [ 3754] 0 3754 18209 13289 32 3 0 1000 syz-executor.5 [ 530.118413] [ 3781] 0 3781 18179 13262 32 3 0 1000 syz-executor.5 [ 530.118422] [ 3840] 0 3840 18179 13262 32 3 0 1000 syz-executor.5 [ 530.118431] [ 3881] 0 3881 18179 13262 32 3 0 1000 syz-executor.5 [ 530.118440] [ 3936] 0 3936 18179 13262 32 3 0 1000 syz-executor.5 [ 530.118449] [ 3962] 0 3962 18179 8991 26 4 0 1000 syz-executor.4 [ 530.118462] [ 3964] 0 3964 18179 8991 26 4 0 1000 syz-executor.4 [ 530.123661] [ 4010] 0 4010 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123670] [ 4083] 0 4083 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123679] [ 4130] 0 4130 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123688] [ 4171] 0 4171 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123697] [ 4240] 0 4240 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123706] [ 4304] 0 4304 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123715] [ 4326] 0 4326 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123724] [ 4384] 0 4384 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123733] [ 4434] 0 4434 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123741] [ 4444] 0 4444 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123751] [ 4522] 0 4522 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123760] [ 4586] 0 4586 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123769] [ 4633] 0 4633 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123777] [ 4695] 0 4695 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123786] [ 4751] 0 4751 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123794] [ 4803] 0 4803 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123808] [ 4856] 0 4856 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123817] [ 4906] 0 4906 18179 13262 32 3 0 1000 syz-executor.5 [ 530.123826] [ 5032] 0 5032 18146 8733 24 3 0 1000 syz-executor.5 [ 530.123838] [ 5053] 0 5053 18146 8733 24 3 0 1000 syz-executor.5 [ 530.124810] [ 5087] 0 5087 18146 8733 24 3 0 1000 syz-executor.5 [ 530.124820] [ 5146] 0 5146 18146 8740 24 3 0 1000 syz-executor.5 [ 530.124829] [ 5186] 0 5186 18146 8740 24 3 0 1000 syz-executor.5 [ 530.124838] [ 5216] 0 5216 18146 8740 24 3 0 1000 syz-executor.5 [ 530.124847] [ 5254] 0 5254 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124856] [ 5315] 0 5315 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124864] [ 5347] 0 5347 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124873] [ 5393] 0 5393 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124882] [ 5668] 0 5668 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124891] [ 5720] 0 5720 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124900] [ 5782] 0 5782 18179 13262 32 3 0 1000 syz-executor.5 [ 530.124913] [ 5825] 0 5825 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125452] [ 5860] 0 5860 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125461] [ 5888] 0 5888 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125470] [ 5974] 0 5974 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125479] [ 6016] 0 6016 18146 8996 26 4 0 1000 syz-executor.4 [ 530.125487] [ 6037] 0 6037 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125496] [ 6111] 0 6111 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125504] [ 6137] 0 6137 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125512] [ 6181] 0 6181 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125521] [ 6211] 0 6211 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125529] [ 6261] 0 6261 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125537] [ 6434] 0 6434 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125545] [ 6531] 0 6531 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125553] [ 6614] 0 6614 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125561] [ 6656] 0 6656 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125569] [ 6694] 0 6694 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125577] [ 6738] 0 6738 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125585] [ 6763] 0 6763 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125593] [ 6809] 0 6809 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125601] [ 7337] 0 7337 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125609] [ 7362] 0 7362 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125618] [ 7387] 0 7387 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125626] [ 7401] 0 7401 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125635] [ 7695] 0 7695 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125643] [ 7751] 0 7751 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125651] [ 7772] 0 7772 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125659] [ 7820] 0 7820 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125667] [ 7881] 0 7881 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125674] [ 7926] 0 7926 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125682] [ 7945] 0 7945 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125690] [ 7980] 0 7980 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125698] [ 8012] 0 8012 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125706] [ 8068] 0 8068 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125714] [ 8089] 0 8089 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125723] [ 8123] 0 8123 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125732] [ 8144] 0 8144 18179 13262 32 3 0 1000 syz-executor.5 [ 530.125740] [ 8523] 0 8523 18278 10551 28 3 0 1000 syz-executor.5 [ 530.125748] [ 8612] 0 8612 18212 8972 26 4 0 1000 syz-executor.5 [ 530.125757] [ 9546] 0 9546 18212 8991 26 4 0 1000 syz-executor.4 [ 530.125767] [ 9590] 0 9590 15109 10164 27 3 0 1000 syz-executor.4 [ 530.125776] [ 9615] 0 9615 15109 9742 26 3 0 1000 syz-executor.4 [ 530.125785] [11066] 0 11066 18114 241 23 3 0 0 syz-executor.3 [ 530.125794] [11067] 0 11067 18113 8970 24 4 0 0 syz-executor.3 [ 530.125808] [13042] 0 13042 18179 8968 26 4 0 1000 syz-executor.5 [ 530.125817] [13079] 0 13079 18179 8968 26 4 0 1000 syz-executor.5 [ 530.125829] [21137] 0 21137 18245 8972 26 4 0 1000 syz-executor.5 [ 530.127139] [21183] 0 21183 18146 8966 26 4 0 1000 syz-executor.5 [ 530.127150] [21790] 0 21790 18114 242 23 3 0 0 syz-executor.0 [ 530.127159] [21791] 0 21791 18113 8958 24 4 0 0 syz-executor.0 [ 530.127169] [22185] 0 22185 18114 241 23 3 0 0 syz-executor.2 [ 530.127178] [22186] 0 22186 18113 8971 24 4 0 0 syz-executor.2 [ 530.127187] [22421] 0 22421 18180 13203 32 3 0 1000 syz-executor.2 [ 530.127197] [22422] 0 22422 18211 13291 32 3 0 1000 syz-executor.2 [ 530.127206] [22599] 0 22599 18146 8990 26 4 0 1000 syz-executor.4 [ 530.127216] [22741] 0 22741 18179 8991 26 4 0 1000 syz-executor.2 [ 530.127226] [23041] 0 23041 18147 8742 25 3 0 1000 syz-executor.3 [ 530.127235] [23056] 0 23056 18179 8744 25 3 0 1000 syz-executor.3 [ 530.127244] [23429] 0 23429 5430 226 16 3 0 -1000 udevd [ 530.127253] [24292] 0 24292 18146 8733 24 3 0 1000 syz-executor.5 [ 530.127262] [24312] 0 24312 18179 8745 26 3 0 1000 syz-executor.5 [ 530.127271] [24386] 0 24386 18146 8733 24 3 0 1000 syz-executor.4 [ 530.127279] [24431] 0 24431 18245 8748 25 3 0 1000 syz-executor.4 [ 530.127289] [24752] 0 24752 18146 8989 26 4 0 1000 syz-executor.4 [ 530.127297] [25789] 0 25789 18179 8972 26 4 0 1000 syz-executor.0 [ 530.127306] [25819] 0 25819 18278 10362 28 4 0 1000 syz-executor.4 [ 530.127315] [25849] 0 25849 18146 8742 25 3 0 1000 syz-executor.4 [ 530.127323] [25883] 0 25883 18278 10873 29 4 0 1000 syz-executor.4 [ 530.127332] [25994] 0 25994 18278 10808 29 4 0 1000 syz-executor.4 [ 530.127341] [26175] 0 26175 18278 10746 29 4 0 1000 syz-executor.4 [ 530.127350] [26319] 0 26319 18146 8736 24 3 0 1000 syz-executor.0 [ 530.127359] [26366] 0 26366 18245 12846 32 3 0 1000 syz-executor.0 [ 530.127368] [28375] 0 28375 5430 226 16 3 0 -1000 udevd [ 530.127377] [30104] 0 30104 18179 8804 24 3 0 1000 syz-executor.0 [ 530.127387] [30316] 0 30316 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127397] [30371] 0 30371 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127407] [30411] 0 30411 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127416] [30447] 0 30447 18146 8741 24 3 0 1000 syz-executor.2 [ 530.127426] [30451] 0 30451 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127435] [30468] 0 30468 18146 8741 24 3 0 1000 syz-executor.2 [ 530.127445] [30492] 0 30492 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127455] [30532] 0 30532 18179 13262 32 3 0 1000 syz-executor.0 [ 530.127465] [30571] 0 30571 18179 13262 32 3 0 1000 syz-executor.0 ** 27 printk messages dropped ** [ 530.128931] [30984] 0 30984 18179 13262 32 3 0 1000 syz-executor.2 [ 530.128940] [30993] 0 30993 18179 13262 32 3 0 1000 syz-executor.3 ** 421 printk messages dropped ** [ 532.353698] [13079] 0 13079 18179 8968 26 4 0 1000 syz-executor.5 ** 64 printk messages dropped ** [ 532.354306] [30984] 0 30984 18179 13262 32 3 0 1000 syz-executor.2 [ 532.354315] [30993] 0 30993 18179 13262 32 3 0 1000 syz-executor.3 ** 483 printk messages dropped ** [ 532.374822] [30945] 0 30945 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374831] [30980] 0 30980 18179 13262 32 3 0 1000 syz-executor.0 [ 532.374840] [30984] 0 30984 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374848] [30993] 0 30993 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374858] [31026] 0 31026 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374867] [31028] 0 31028 18179 13262 32 3 0 1000 syz-executor.0 [ 532.374877] [31058] 0 31058 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374887] [31060] 0 31060 18179 13262 32 3 0 1000 syz-executor.0 [ 532.374895] [31063] 0 31063 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374910] [31095] 0 31095 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374919] [31101] 0 31101 18179 13262 32 3 0 1000 syz-executor.0 [ 532.374928] [31103] 0 31103 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374936] [31147] 0 31147 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374946] [31150] 0 31150 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374955] [31191] 0 31191 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374964] [31204] 0 31204 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374973] [31235] 0 31235 18179 13262 32 3 0 1000 syz-executor.2 [ 532.374982] [31245] 0 31245 18179 13262 32 3 0 1000 syz-executor.3 [ 532.374991] [31270] 0 31270 18146 8736 24 3 0 1000 syz-executor.0 [ 532.375001] [31275] 0 31275 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375011] [31288] 0 31288 18146 8736 24 3 0 1000 syz-executor.0 [ 532.375020] [31299] 0 31299 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375029] [31311] 0 31311 18146 8736 24 3 0 1000 syz-executor.0 [ 532.375038] [31324] 0 31324 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375047] [31335] 0 31335 18146 8743 24 3 0 1000 syz-executor.0 [ 532.375056] [31355] 0 31355 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375065] [31358] 0 31358 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375075] [31375] 0 31375 18146 8743 24 3 0 1000 syz-executor.0 [ 532.375084] [31393] 0 31393 18146 8743 24 3 0 1000 syz-executor.0 [ 532.375093] [31401] 0 31401 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375102] [31402] 0 31402 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375111] [31444] 0 31444 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375120] [31445] 0 31445 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375129] [31477] 0 31477 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375139] [31490] 0 31490 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375149] [31529] 0 31529 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375158] [31552] 0 31552 18146 8734 24 3 0 1000 syz-executor.2 [ 532.375167] [31576] 0 31576 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375176] [31578] 0 31578 18146 8734 24 3 0 1000 syz-executor.2 [ 532.375185] [31602] 0 31602 18146 8734 24 3 0 1000 syz-executor.2 [ 532.375195] [31630] 0 31630 18146 8733 24 3 0 1000 syz-executor.3 [ 532.375204] [31631] 0 31631 18146 8741 24 3 0 1000 syz-executor.2 [ 532.375213] [31632] 0 31632 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375222] [31656] 0 31656 18146 8741 24 3 0 1000 syz-executor.2 [ 532.375231] [31657] 0 31657 18146 8733 24 3 0 1000 syz-executor.3 [ 532.375241] [31666] 0 31666 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375249] [31688] 0 31688 18146 8733 24 3 0 1000 syz-executor.3 [ 532.375258] [31689] 0 31689 18146 8741 24 3 0 1000 syz-executor.2 [ 532.375268] [31709] 0 31709 18146 8740 24 3 0 1000 syz-executor.3 [ 532.375278] [31716] 0 31716 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375287] [31729] 0 31729 18146 8740 24 3 0 1000 syz-executor.3 [ 532.375296] [31737] 0 31737 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375305] [31751] 0 31751 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375314] [31752] 0 31752 18146 8740 24 3 0 1000 syz-executor.3 [ 532.375323] [31779] 0 31779 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375332] [31790] 0 31790 18146 8741 24 3 0 1000 syz-executor.5 [ 532.375341] [31794] 0 31794 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375351] [31796] 0 31796 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375360] [31812] 0 31812 18146 8741 24 3 0 1000 syz-executor.5 [ 532.375369] [31824] 0 31824 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375379] [31828] 0 31828 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375388] [31834] 0 31834 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375397] [31840] 0 31840 18146 8741 24 3 0 1000 syz-executor.5 [ 532.375407] [31865] 0 31865 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375416] [31878] 0 31878 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375425] [31883] 0 31883 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375435] [31924] 0 31924 18179 13292 32 3 0 1000 syz-executor.2 [ 532.375445] [31930] 0 31930 18245 8749 27 3 0 0 syz-executor.5 [ 532.375454] [31938] 0 31938 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375463] [31939] 0 31939 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375472] [31960] 0 31960 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375485] [31962] 0 31962 18245 8749 32 3 0 0 syz-executor.5 [ 532.375638] [31964] 0 31964 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375647] [31967] 0 31967 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375656] [31994] 0 31994 18245 8749 27 3 0 0 syz-executor.5 [ 532.375666] [31997] 0 31997 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375675] [32001] 0 32001 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375684] [32002] 0 32002 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375693] [32028] 0 32028 18245 8749 28 3 0 0 syz-executor.5 [ 532.375702] [32030] 0 32030 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375711] [32034] 0 32034 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375721] [32037] 0 32037 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375730] [32061] 0 32061 18245 8749 26 3 0 0 syz-executor.5 [ 532.375739] [32063] 0 32063 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375748] [32086] 0 32086 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375758] [32090] 0 32090 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375767] [32097] 0 32097 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375777] [32142] 0 32142 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375786] [32144] 0 32144 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375795] [32147] 0 32147 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375805] [32157] 0 32157 18212 8971 33 4 0 0 syz-executor.5 [ 532.375815] [32174] 0 32174 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375824] [32176] 0 32176 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375833] [32179] 0 32179 18212 8971 33 4 0 0 syz-executor.5 [ 532.375842] [32187] 0 32187 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375851] [32196] 0 32196 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375860] [32200] 0 32200 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375869] [32218] 0 32218 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375878] [32222] 0 32222 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375887] [32234] 0 32234 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375896] [32239] 0 32239 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375909] [32241] 0 32241 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375918] [32255] 0 32255 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375927] [32258] 0 32258 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375936] [32263] 0 32263 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375945] [32293] 0 32293 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375955] [32295] 0 32295 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375964] [32313] 0 32313 18179 13262 32 3 0 1000 syz-executor.2 [ 532.375973] [32324] 0 32324 18179 13262 32 3 0 1000 syz-executor.3 [ 532.375982] [32329] 0 32329 18179 13262 32 3 0 1000 syz-executor.0 [ 532.375991] [32367] 0 32367 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376000] [32369] 0 32369 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376010] [32371] 0 32371 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376019] [32405] 0 32405 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376028] [32409] 0 32409 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376037] [32413] 0 32413 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376047] [32432] 0 32432 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376057] [32436] 0 32436 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376065] [32474] 0 32474 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376075] [32477] 0 32477 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376084] [32488] 0 32488 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376094] [32528] 0 32528 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376103] [32535] 0 32535 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376112] [32537] 0 32537 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376121] [32576] 0 32576 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376130] [32578] 0 32578 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376139] [32580] 0 32580 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376147] [32611] 0 32611 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376157] [32615] 0 32615 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376166] [32621] 0 32621 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376176] [32639] 0 32639 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376184] [32641] 0 32641 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376193] [32658] 0 32658 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376202] [32661] 0 32661 18179 13262 32 3 0 0 syz-executor.5 [ 532.376212] [32662] 0 32662 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376221] [32670] 0 32670 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376230] [32681] 0 32681 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376239] [32682] 0 32682 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376248] [32689] 0 32689 18114 241 23 3 0 0 syz-executor.1 [ 532.376258] [32690] 0 32690 18113 8952 24 4 0 0 syz-executor.1 [ 532.376268] [ 483] 0 483 18179 13262 32 3 0 0 syz-executor.5 [ 532.376278] [ 485] 0 485 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376287] [ 492] 0 492 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376296] [ 493] 0 493 18179 13262 32 3 0 1000 syz-executor.1 [ 532.376305] [ 494] 0 494 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376315] [ 522] 0 522 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376323] [ 524] 0 524 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376332] [ 549] 0 549 18179 13262 32 3 0 0 syz-executor.5 [ 532.376341] [ 558] 0 558 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376350] [ 572] 0 572 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376360] [ 575] 0 575 18179 13262 32 3 0 1000 syz-executor.1 [ 532.376369] [ 602] 0 602 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376378] [ 609] 0 609 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376387] [ 617] 0 617 18179 13262 32 3 0 0 syz-executor.5 [ 532.376397] [ 638] 0 638 18179 13262 32 3 0 1000 syz-executor.1 [ 532.376406] [ 640] 0 640 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376415] [ 641] 0 641 18179 13262 32 3 0 0 syz-executor.5 [ 532.376424] [ 647] 0 647 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376433] [ 650] 0 650 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376442] [ 665] 0 665 18146 8741 24 3 0 0 syz-executor.5 [ 532.376451] [ 667] 0 667 18146 8736 24 3 0 1000 syz-executor.0 [ 532.376461] [ 673] 0 673 18146 8741 24 3 0 0 syz-executor.5 [ 532.376469] [ 680] 0 680 18146 8741 24 3 0 0 syz-executor.5 [ 532.376478] [ 685] 0 685 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376487] [ 693] 0 693 18146 8736 24 3 0 1000 syz-executor.0 [ 532.376496] [ 695] 0 695 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376505] [ 706] 0 706 18146 8738 24 3 0 1000 syz-executor.1 [ 532.376515] [ 721] 0 721 18146 8738 24 3 0 1000 syz-executor.1 [ 532.376524] [ 723] 0 723 18146 8741 24 3 0 0 syz-executor.5 [ 532.376533] [ 727] 0 727 18146 8734 24 3 0 0 syz-executor.5 [ 532.376542] [ 731] 0 731 18146 8734 24 3 0 0 syz-executor.5 [ 532.376551] [ 736] 0 736 18146 8734 24 3 0 0 syz-executor.5 [ 532.376560] [ 738] 0 738 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376570] [ 740] 0 740 18179 13262 32 3 0 1000 syz-executor.0 [ 532.376578] [ 746] 0 746 18146 8731 24 3 0 1000 syz-executor.1 [ 532.376588] [ 747] 0 747 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376597] [ 782] 0 782 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376607] [ 786] 0 786 18179 13262 32 3 0 1000 syz-executor.1 [ 532.376619] [ 787] 0 787 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376768] [ 815] 0 815 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376778] [ 816] 0 816 18146 8740 24 3 0 1000 syz-executor.4 [ 532.376787] [ 822] 0 822 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376796] [ 837] 0 837 18146 8738 24 3 0 1000 syz-executor.1 [ 532.376805] [ 839] 0 839 18146 8734 24 3 0 0 syz-executor.5 [ 532.376814] [ 844] 0 844 18146 8733 24 3 0 1000 syz-executor.4 [ 532.376824] [ 847] 0 847 18146 8734 24 3 0 0 syz-executor.5 [ 532.376833] [ 850] 0 850 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376842] [ 852] 0 852 18146 8734 24 3 0 0 syz-executor.5 [ 532.376851] [ 857] 0 857 18146 8731 24 3 0 1000 syz-executor.1 [ 532.376860] [ 860] 0 860 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376868] [ 872] 0 872 18146 8733 24 3 0 1000 syz-executor.4 [ 532.376877] [ 883] 0 883 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376886] [ 899] 0 899 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376896] [ 901] 0 901 18179 13262 32 3 0 0 syz-executor.5 [ 532.376910] [ 903] 0 903 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376919] [ 934] 0 934 18179 13262 32 3 0 0 syz-executor.5 [ 532.376928] [ 936] 0 936 18179 13262 32 3 0 1000 syz-executor.3 [ 532.376938] [ 939] 0 939 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376947] [ 941] 0 941 18179 13262 32 3 0 1000 syz-executor.4 [ 532.376956] [ 955] 0 955 18146 8964 26 4 0 1000 syz-executor.1 [ 532.376965] [ 960] 0 960 18212 13293 32 3 0 1000 syz-executor.4 [ 532.376974] [ 964] 0 964 18179 13262 32 3 0 1000 syz-executor.2 [ 532.376983] [ 981] 0 981 18146 8740 24 3 0 1000 syz-executor.4 [ 532.376992] [ 999] 0 999 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377001] [ 1001] 0 1001 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377010] [ 1019] 0 1019 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377019] [ 1021] 0 1021 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377029] [ 1051] 0 1051 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377038] [ 1054] 0 1054 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377047] [ 1075] 0 1075 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377056] [ 1108] 0 1108 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377064] [ 1147] 0 1147 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377074] [ 1153] 0 1153 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377083] [ 1168] 0 1168 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377092] [ 1170] 0 1170 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377101] [ 1199] 0 1199 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377110] [ 1203] 0 1203 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377120] [ 1219] 0 1219 18212 13294 32 3 0 1000 syz-executor.4 [ 532.377129] [ 1230] 0 1230 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377138] [ 1233] 0 1233 3648 41 11 3 0 0 getty [ 532.377147] [ 1234] 0 1234 3648 42 13 4 0 0 getty [ 532.377157] [ 1235] 0 1235 3648 41 13 3 0 0 getty [ 532.377166] [ 1236] 0 1236 3648 43 13 3 0 0 getty [ 532.377176] [ 1237] 0 1237 3648 42 12 3 0 0 getty [ 532.377185] [ 1238] 0 1238 3648 43 13 3 0 0 getty [ 532.377194] [ 1243] 0 1243 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377202] [ 1263] 0 1263 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377212] [ 1265] 0 1265 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377221] [ 1271] 0 1271 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377230] [ 1273] 0 1273 18212 13293 32 3 0 1000 syz-executor.3 [ 532.377239] [ 1276] 0 1276 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377248] [ 1280] 0 1280 18212 13293 32 3 0 1000 syz-executor.2 [ 532.377258] [ 1303] 0 1303 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377267] [ 1304] 0 1304 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377275] [ 1305] 0 1305 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377285] [ 1308] 0 1308 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377293] [ 1313] 0 1313 18212 13294 32 3 0 1000 syz-executor.2 [ 532.377302] [ 1322] 0 1322 18212 13292 32 3 0 1000 syz-executor.3 [ 532.377311] [ 1328] 0 1328 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377320] [ 1335] 0 1335 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377329] [ 1340] 0 1340 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377338] [ 1343] 0 1343 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377348] [ 1347] 0 1347 18212 13293 32 3 0 1000 syz-executor.2 [ 532.377357] [ 1360] 0 1360 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377367] [ 1371] 0 1371 18212 13292 32 3 0 1000 syz-executor.3 [ 532.377375] [ 1403] 0 1403 18179 13292 32 3 0 1000 syz-executor.2 [ 532.377385] [ 1406] 0 1406 18311 8961 26 4 0 1000 syz-executor.0 [ 532.377394] [ 1410] 0 1410 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377403] [ 1414] 0 1414 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377412] [ 1421] 0 1421 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377422] [ 1446] 0 1423 18311 8982 33 4 0 0 syz-executor.5 [ 532.377431] [ 1426] 0 1426 18179 13262 32 3 0 1000 syz-executor.2 [ 532.377440] [ 1427] 0 1427 18212 13293 32 3 0 1000 syz-executor.3 [ 532.377449] [ 1440] 0 1440 5364 171 16 3 0 -1000 udevd [ 532.377458] [ 1449] 0 1449 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377468] [ 1460] 0 1450 18344 18215 42 4 0 1000 syz-executor.2 [ 532.377477] [ 1458] 0 1458 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377488] [ 1467] 0 1467 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377503] [ 1469] 0 1469 18179 13262 32 3 0 1000 syz-executor.3 [ 532.377512] [ 1474] 0 1474 18179 13262 32 3 0 1000 syz-executor.4 [ 532.377521] [ 1475] 0 1475 18212 17928 41 4 0 1000 syz-executor.3 [ 532.377531] [ 1478] 0 1478 18179 13203 32 3 0 1000 syz-executor.3 [ 532.377540] [ 1480] 0 1480 18212 13293 32 3 0 1000 syz-executor.4 [ 532.377550] [ 1486] 0 1486 18212 17928 41 4 0 1000 syz-executor.3 [ 532.377556] Out of memory: Kill process 1450 (syz-executor.2) score 1010 or sacrifice child [ 532.377573] Killed process 1460 (syz-executor.2) total-vm:73376kB, anon-rss:18512kB, file-rss:54348kB, shmem-rss:0kB [ 532.394311] oom_reaper: reaped process 1460 (syz-executor.2), now anon-rss:18480kB, file-rss:19552kB, shmem-rss:0kB [ 532.396037] udevd invoked oom-killer: gfp_mask=0x27080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOTRACK), nodemask=0, order=3, oom_score_adj=-1000 [ 532.396047] CPU: 0 PID: 28375 Comm: udevd Not tainted 4.9.194+ #0 [ 532.396062] ffff8801c5f377e0 ffffffff81b67001 ffff8801c5f37b38 ffffffff833f1c30 [ 532.396071] 00000000fffffc18 ffff8801c5f37b50 0000000000000003 ffff8801c5f37860 [ 532.396080] ffffffff81506e44 0000000000000003 00000000fffffc18 ffffffff8282ac45 [ 532.396081] Call Trace: [ 532.396099] [<0000000052c739a6>] dump_stack+0xc1/0x120 [ 532.396111] [<000000001a8d2c76>] dump_header.isra.0+0x142/0x74c [ 532.396122] [<0000000014a08a28>] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 532.396130] [<0000000099b3f96d>] ? ___ratelimit+0x55/0x413 [ 532.396137] [<00000000941131fc>] oom_kill_process.cold+0xd/0xa74 [ 532.396150] [<000000004b951139>] ? rcu_read_unlock_special+0x6cb/0xb30 [ 532.396161] [<000000006b5f65f2>] ? has_capability_noaudit+0x25/0x30 [ 532.396170] [<0000000027bd1b19>] ? out_of_memory+0x6d3/0xea0 [ 532.396177] [<000000003df52a24>] out_of_memory+0x29b/0xea0 [ 532.396184] [<00000000068d0e02>] ? out_of_memory+0x41c/0xea0 [ 532.396191] [<000000007d8372f8>] ? oom_killer_disable+0x210/0x210 [ 532.396198] [<00000000e498cb3d>] ? trace_hardirqs_on+0xd/0x10 [ 532.396204] [<0000000006d18186>] ? __alloc_pages_nodemask+0x10d0/0x1a80 [ 532.396211] [<000000000150cc06>] __alloc_pages_nodemask+0x1730/0x1a80 [ 532.396218] [<00000000087c8f28>] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 532.396229] [<00000000657c8cbe>] ? copy_process.part.0+0x1714/0x6690 [ 532.396236] [<00000000dd638285>] ? kasan_slab_alloc+0xf/0x20 [ 532.396242] [<000000008c402d48>] ? kmem_cache_alloc+0x155/0x2b0 [ 532.396249] [<00000000a5f7330f>] copy_process.part.0+0x2da/0x6690 [ 532.396255] [<000000001a8d5b6f>] ? trace_hardirqs_on+0x10/0x10 [ 532.396261] [<00000000938bd88c>] ? kasan_unpoison_shadow+0x35/0x50 [ 532.396268] [<000000003c8f32a4>] ? kasan_kmalloc+0xb7/0xd0 [ 532.396277] [<00000000f47ef255>] ? expand_files+0x3ba/0x6e0 [ 532.396285] [<0000000050574d9d>] ? __cleanup_sighand+0x50/0x50 [ 532.396292] [<00000000ae5558da>] ? __fd_install+0x247/0x620 [ 532.396298] [<0000000020f22cb9>] ? get_unused_fd_flags+0xd0/0xd0 [ 532.396305] [<00000000df9d0769>] ? do_raw_spin_unlock+0x142/0x220 [ 532.396312] [<0000000005fb7ac7>] _do_fork+0x1c1/0xd50 [ 532.396319] [<00000000401d6447>] ? fork_idle+0x280/0x280 [ 532.396326] [<000000001ae65373>] ? fd_install+0x4d/0x60 [ 532.396333] [<00000000ce52bbf6>] ? SyS_pipe2+0x96/0x170 [ 532.396339] [<00000000b5ba2910>] ? do_pipe_flags+0x150/0x150 [ 532.396346] [<0000000050f41ce5>] SyS_clone+0x37/0x50 [ 532.396352] [<0000000058f15c08>] ? sys_vfork+0x30/0x30 [ 532.396359] [<00000000834d9b0a>] do_syscall_64+0x1ad/0x5c0 [ 532.396366] [<00000000d61a7bd0>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 532.396369] Mem-Info: [ 532.396386] active_anon:111789 inactive_anon:1355380 isolated_anon:0 [ 532.396386] active_file:15 inactive_file:17 isolated_file:0 [ 532.396386] unevictable:18665 dirty:19 writeback:0 unstable:0 [ 532.396386] slab_reclaimable:9521 slab_unreclaimable:64060 [ 532.396386] mapped:61736 shmem:48 pagetables:12731 bounce:0 [ 532.396386] free:10567 free_pcp:178 free_cma:0 [ 532.396403] Node 0 active_anon:447156kB inactive_anon:5421520kB active_file:60kB inactive_file:68kB unevictable:74660kB isolated(anon):0kB isolated(file):0kB mapped:246944kB dirty:76kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB pages_scanned:34 all_unreclaimable? no [ 532.396421] DMA32 free:18720kB min:4696kB low:7712kB high:10728kB active_anon:110404kB inactive_anon:2758864kB active_file:0kB inactive_file:0kB unevictable:18880kB writepending:0kB present:3145324kB managed:3020092kB mlocked:18880kB slab_reclaimable:13176kB slab_unreclaimable:64772kB kernel_stack:6272kB pagetables:20980kB bounce:0kB free_pcp:4kB local_pcp:4kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 532.396445] Normal free:23548kB min:5580kB low:9168kB high:12756kB active_anon:336752kB inactive_anon:2662656kB active_file:60kB inactive_file:68kB unevictable:55780kB writepending:68kB present:4718592kB managed:3589312kB mlocked:55780kB slab_reclaimable:24908kB slab_unreclaimable:191468kB kernel_stack:10624kB pagetables:29944kB bounce:0kB free_pcp:708kB local_pcp:588kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 532.396491] DMA32: 137*4kB (UME) 30*8kB (UE) 2*16kB (UE) 7*32kB (UME) 2*64kB (UE) 1*128kB (U) 12*256kB (UM) 2*512kB (UM) 1*1024kB (E) 2*2048kB (ME) 2*4096kB (M) = 18708kB Normal: 225*4kB (MH) 344*8kB (UMH) 150*16kB (UME) 90*32kB (UM) 77*64kB (UM) 33*128kB (UME) 7*256kB (UM) 5*512kB (UM) 1*1024kB (M) 0*2048kB 0*4096kB = 23460kB 9580 total pagecache pages [ 532.396534] 0 pages in swap cache [ 532.396538] Swap cache stats: add 0, delete 0, find 0/0 [ 532.396540] Free swap = 0kB [ 532.396542] Total swap = 0kB [ 532.396544] 1965979 pages RAM [ 532.396545] 0 pages HighMem/MovableOnly [ 532.396547] 313628 pages reserved [ 532.396549] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [ 532.396574] [ 470] 0 470 5365 169 17 3 0 -1000 udevd [ 532.396587] [ 1760] 0 1760 2492 573 9 3 0 0 dhclient [ 532.396735] [ 1891] 0 1891 14231 109 23 3 0 0 rsyslogd [ 532.396744] [ 1946] 0 1946 4724 52 15 3 0 0 cron [ 532.396753] [ 1964] 0 1964 3767 70 11 3 0 0 mcstransd [ 532.396762] [ 1966] 0 1966 12926 1232 27 3 0 0 restorecond [ 532.396771] [ 1992] 0 1992 12489 152 29 3 0 -1000 sshd [ 532.396780] [ 2022] 0 2022 3648 40 12 3 0 0 getty [ 532.396789] [ 2032] 0 2032 17820 198 40 3 0 0 sshd [ 532.396799] [ 2034] 0 2034 125966 92415 209 5 0 0 syz-fuzzer [ 532.396808] [ 2091] 0 2091 18114 241 23 3 0 0 syz-executor.5 [ 532.396817] [ 2096] 0 2096 18114 241 23 3 0 0 syz-executor.4 [ 532.396826] [ 2097] 0 2097 18113 8953 24 4 0 0 syz-executor.5 [ 532.396835] [ 2107] 0 2107 18113 8954 24 4 0 0 syz-executor.4 [ 532.396845] [ 3752] 0 3752 18179 13203 32 3 0 1000 syz-executor.5 [ 532.396854] [ 3754] 0 3754 18209 13289 32 3 0 1000 syz-executor.5 [ 532.396863] [ 3781] 0 3781 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396873] [ 3840] 0 3840 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396882] [ 3881] 0 3881 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396891] [ 3936] 0 3936 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396900] [ 3962] 0 3962 18179 8968 26 4 0 1000 syz-executor.4 [ 532.396909] [ 3964] 0 3964 18179 8968 26 4 0 1000 syz-executor.4 [ 532.396918] [ 4010] 0 4010 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396927] [ 4083] 0 4083 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396936] [ 4130] 0 4130 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396945] [ 4171] 0 4171 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396954] [ 4240] 0 4240 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396962] [ 4304] 0 4304 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396971] [ 4326] 0 4326 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396980] [ 4384] 0 4384 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396989] [ 4434] 0 4434 18179 13262 32 3 0 1000 syz-executor.5 [ 532.396999] [ 4444] 0 4444 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397007] [ 4522] 0 4522 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397016] [ 4586] 0 4586 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397026] [ 4633] 0 4633 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397035] [ 4695] 0 4695 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397043] [ 4751] 0 4751 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397053] [ 4803] 0 4803 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397062] [ 4856] 0 4856 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397071] [ 4906] 0 4906 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397080] [ 5032] 0 5032 18146 8733 24 3 0 1000 syz-executor.5 [ 532.397090] [ 5053] 0 5053 18146 8733 24 3 0 1000 syz-executor.5 [ 532.397098] [ 5087] 0 5087 18146 8733 24 3 0 1000 syz-executor.5 [ 532.397108] [ 5146] 0 5146 18146 8740 24 3 0 1000 syz-executor.5 [ 532.397117] [ 5186] 0 5186 18146 8740 24 3 0 1000 syz-executor.5 [ 532.397126] [ 5216] 0 5216 18146 8740 24 3 0 1000 syz-executor.5 [ 532.397135] [ 5254] 0 5254 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397144] [ 5315] 0 5315 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397153] [ 5347] 0 5347 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397162] [ 5393] 0 5393 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397171] [ 5668] 0 5668 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397180] [ 5720] 0 5720 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397189] [ 5782] 0 5782 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397198] [ 5825] 0 5825 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397207] [ 5860] 0 5860 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397216] [ 5888] 0 5888 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397225] [ 5974] 0 5974 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397234] [ 6016] 0 6016 18146 8967 26 4 0 1000 syz-executor.4 [ 532.397243] [ 6037] 0 6037 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397252] [ 6111] 0 6111 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397261] [ 6137] 0 6137 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397270] [ 6181] 0 6181 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397279] [ 6211] 0 6211 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397288] [ 6261] 0 6261 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397297] [ 6434] 0 6434 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397307] [ 6531] 0 6531 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397316] [ 6614] 0 6614 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397324] [ 6656] 0 6656 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397333] [ 6694] 0 6694 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397342] [ 6738] 0 6738 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397351] [ 6763] 0 6763 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397361] [ 6809] 0 6809 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397370] [ 7337] 0 7337 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397379] [ 7362] 0 7362 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397388] [ 7387] 0 7387 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397402] [ 7401] 0 7401 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397411] [ 7695] 0 7695 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397421] [ 7751] 0 7751 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397429] [ 7772] 0 7772 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397438] [ 7820] 0 7820 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397447] [ 7881] 0 7881 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397456] [ 7926] 0 7926 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397465] [ 7945] 0 7945 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397474] [ 7980] 0 7980 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397483] [ 8012] 0 8012 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397492] [ 8068] 0 8068 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397501] [ 8089] 0 8089 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397511] [ 8123] 0 8123 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397520] [ 8144] 0 8144 18179 13262 32 3 0 1000 syz-executor.5 [ 532.397529] [ 8523] 0 8523 18278 10551 28 3 0 1000 syz-executor.5 [ 532.397538] [ 8612] 0 8612 18212 8972 26 4 0 1000 syz-executor.5 [ 532.397549] [ 9546] 0 9546 18212 8970 26 4 0 1000 syz-executor.4 [ 532.397558] [ 9590] 0 9590 15109 10164 27 3 0 1000 syz-executor.4 [ 532.397567] [ 9615] 0 9615 15109 9742 26 3 0 1000 syz-executor.4 [ 532.397576] [11066] 0 11066 18114 241 23 3 0 0 syz-executor.3 [ 532.397584] [11067] 0 11067 18113 8970 24 4 0 0 syz-executor.3 [ 532.397593] [13042] 0 13042 18179 8968 26 4 0 1000 syz-executor.5 [ 532.397602] [13079] 0 13079 18179 8968 26 4 0 1000 syz-executor.5 [ 532.397611] [21137] 0 21137 18245 8972 26 4 0 1000 syz-executor.5 [ 532.397620] [21183] 0 21183 18146 8966 26 4 0 1000 syz-executor.5 [ 532.397629] [21790] 0 21790 18114 242 23 3 0 0 syz-executor.0 [ 532.397638] [21791] 0 21791 18113 8957 24 4 0 0 syz-executor.0 [ 532.397648] [22185] 0 22185 18114 241 23 3 0 0 syz-executor.2 [ 532.397656] [22186] 0 22186 18113 8971 24 4 0 0 syz-executor.2 [ 532.397665] [22421] 0 22421 18180 13203 32 3 0 1000 syz-executor.2 [ 532.397674] [22422] 0 22422 18211 13291 32 3 0 1000 syz-executor.2 [ 532.397683] [22599] 0 22599 18146 8970 26 4 0 1000 syz-executor.4 [ 532.397692] [22741] 0 22741 18179 8991 26 4 0 1000 syz-executor.2 [ 532.397703] [23041] 0 23041 18147 8742 25 3 0 1000 syz-executor.3 [ 532.397711] [23056] 0 23056 18179 8744 25 3 0 1000 syz-executor.3 [ 532.397866] [23429] 0 23429 5430 215 16 3 0 -1000 udevd [ 532.397875] [24292] 0 24292 18146 8733 24 3 0 1000 syz-executor.5 [ 532.397884] [24312] 0 24312 18179 8745 26 3 0 1000 syz-executor.5 [ 532.397893] [24386] 0 24386 18146 8733 24 3 0 1000 syz-executor.4 [ 532.397902] [24431] 0 24431 18245 8748 25 3 0 1000 syz-executor.4 [ 532.397911] [24752] 0 24752 18146 8966 26 4 0 1000 syz-executor.4 [ 532.397921] [25789] 0 25789 18179 8971 26 4 0 1000 syz-executor.0 [ 532.397930] [25819] 0 25819 18278 10340 28 4 0 1000 syz-executor.4 [ 532.397939] [25849] 0 25849 18146 8742 25 3 0 1000 syz-executor.4 [ 532.397948] [25883] 0 25883 18278 10852 29 4 0 1000 syz-executor.4 [ 532.397958] [25994] 0 25994 18278 10785 29 4 0 1000 syz-executor.4 [ 532.397967] [26175] 0 26175 18278 10716 29 4 0 1000 syz-executor.4 [ 532.397975] [26319] 0 26319 18146 8736 24 3 0 1000 syz-executor.0 [ 532.397984] [26366] 0 26366 18245 12846 32 3 0 1000 syz-executor.0 [ 532.397993] [28375] 0 28375 5430 214 16 3 0 -1000 udevd [ 532.398002] [30104] 0 30104 18179 8804 24 3 0 1000 syz-executor.0 [ 532.398011] [30316] 0 30316 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398021] [30371] 0 30371 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398030] [30411] 0 30411 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398039] [30447] 0 30447 18146 8741 24 3 0 1000 syz-executor.2 [ 532.398048] [30451] 0 30451 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398058] [30468] 0 30468 18146 8741 24 3 0 1000 syz-executor.2 [ 532.398067] [30492] 0 30492 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398076] [30532] 0 30532 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398086] [30571] 0 30571 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398094] [30587] 0 30587 18146 8734 24 3 0 1000 syz-executor.2 [ 532.398103] [30615] 0 30615 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398112] [30649] 0 30649 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398121] [30652] 0 30652 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398130] [30655] 0 30655 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398140] [30681] 0 30681 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398149] [30683] 0 30683 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398157] [30684] 0 30684 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398167] [30724] 0 30724 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398176] [30731] 0 30731 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398185] [30732] 0 30732 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398194] [30765] 0 30765 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398204] [30788] 0 30788 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398212] [30789] 0 30789 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398222] [30818] 0 30818 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398231] [30820] 0 30820 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398240] [30823] 0 30823 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398249] [30847] 0 30847 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398258] [30871] 0 30871 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398267] [30878] 0 30878 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398276] [30880] 0 30880 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398285] [30919] 0 30919 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398294] [30921] 0 30921 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398303] [30922] 0 30922 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398312] [30938] 0 30938 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398322] [30945] 0 30945 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398331] [30980] 0 30980 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398341] [30984] 0 30984 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398350] [30993] 0 30993 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398359] [31026] 0 31026 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398369] [31028] 0 31028 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398377] [31058] 0 31058 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398387] [31060] 0 31060 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398401] [31063] 0 31063 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398412] [31095] 0 31095 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398421] [31101] 0 31101 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398430] [31103] 0 31103 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398439] [31147] 0 31147 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398448] [31150] 0 31150 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398458] [31191] 0 31191 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398466] [31204] 0 31204 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398475] [31235] 0 31235 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398484] [31245] 0 31245 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398493] [31270] 0 31270 18146 8736 24 3 0 1000 syz-executor.0 [ 532.398502] [31275] 0 31275 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398511] [31288] 0 31288 18146 8736 24 3 0 1000 syz-executor.0 [ 532.398520] [31299] 0 31299 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398529] [31311] 0 31311 18146 8736 24 3 0 1000 syz-executor.0 [ 532.398538] [31324] 0 31324 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398547] [31335] 0 31335 18146 8743 24 3 0 1000 syz-executor.0 [ 532.398556] [31355] 0 31355 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398565] [31358] 0 31358 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398574] [31375] 0 31375 18146 8743 24 3 0 1000 syz-executor.0 [ 532.398583] [31393] 0 31393 18146 8743 24 3 0 1000 syz-executor.0 [ 532.398592] [31401] 0 31401 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398601] [31402] 0 31402 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398611] [31444] 0 31444 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398620] [31445] 0 31445 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398629] [31477] 0 31477 18179 13262 32 3 0 1000 syz-executor.3 [ 532.398638] [31490] 0 31490 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398647] [31529] 0 31529 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398656] [31552] 0 31552 18146 8734 24 3 0 1000 syz-executor.2 [ 532.398665] [31576] 0 31576 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398674] [31578] 0 31578 18146 8734 24 3 0 1000 syz-executor.2 [ 532.398683] [31602] 0 31602 18146 8734 24 3 0 1000 syz-executor.2 [ 532.398692] [31630] 0 31630 18146 8733 24 3 0 1000 syz-executor.3 [ 532.398701] [31631] 0 31631 18146 8741 24 3 0 1000 syz-executor.2 [ 532.398710] [31632] 0 31632 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398719] [31656] 0 31656 18146 8741 24 3 0 1000 syz-executor.2 [ 532.398728] [31657] 0 31657 18146 8733 24 3 0 1000 syz-executor.3 [ 532.398737] [31666] 0 31666 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398745] [31688] 0 31688 18146 8733 24 3 0 1000 syz-executor.3 [ 532.398754] [31689] 0 31689 18146 8741 24 3 0 1000 syz-executor.2 [ 532.398763] [31709] 0 31709 18146 8740 24 3 0 1000 syz-executor.3 [ 532.398772] [31716] 0 31716 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398782] [31729] 0 31729 18146 8740 24 3 0 1000 syz-executor.3 [ 532.398791] [31737] 0 31737 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398800] [31751] 0 31751 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398809] [31752] 0 31752 18146 8740 24 3 0 1000 syz-executor.3 [ 532.398818] [31779] 0 31779 18179 13262 32 3 0 1000 syz-executor.2 [ 532.398827] [31790] 0 31790 18146 8741 24 3 0 1000 syz-executor.5 [ 532.398836] [31794] 0 31794 18179 13262 32 3 0 1000 syz-executor.0 [ 532.398849] [31796] 0 31796 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399000] [31812] 0 31812 18146 8741 24 3 0 1000 syz-executor.5 [ 532.399009] [31824] 0 31824 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399018] [31828] 0 31828 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399027] [31834] 0 31834 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399037] [31840] 0 31840 18146 8741 24 3 0 1000 syz-executor.5 [ 532.399046] [31865] 0 31865 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399055] [31878] 0 31878 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399064] [31883] 0 31883 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399073] [31924] 0 31924 18179 13292 32 3 0 1000 syz-executor.2 [ 532.399082] [31930] 0 31930 18245 8749 27 3 0 0 syz-executor.5 [ 532.399091] [31938] 0 31938 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399100] [31939] 0 31939 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399110] [31960] 0 31960 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399119] [31962] 0 31962 18245 8749 32 3 0 0 syz-executor.5 [ 532.399128] [31964] 0 31964 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399137] [31967] 0 31967 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399146] [31994] 0 31994 18245 8749 27 3 0 0 syz-executor.5 [ 532.399155] [31997] 0 31997 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399164] [32001] 0 32001 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399173] [32002] 0 32002 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399182] [32028] 0 32028 18245 8749 28 3 0 0 syz-executor.5 [ 532.399206] [32030] 0 32030 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399215] [32034] 0 32034 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399224] [32037] 0 32037 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399233] [32061] 0 32061 18245 8749 26 3 0 0 syz-executor.5 [ 532.399242] [32063] 0 32063 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399251] [32086] 0 32086 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399261] [32090] 0 32090 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399270] [32097] 0 32097 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399279] [32142] 0 32142 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399288] [32144] 0 32144 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399297] [32147] 0 32147 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399306] [32157] 0 32157 18212 8971 33 4 0 0 syz-executor.5 [ 532.399316] [32174] 0 32174 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399325] [32176] 0 32176 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399334] [32179] 0 32179 18212 8971 33 4 0 0 syz-executor.5 [ 532.399343] [32187] 0 32187 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399353] [32196] 0 32196 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399362] [32200] 0 32200 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399371] [32218] 0 32218 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399380] [32222] 0 32222 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399389] [32234] 0 32234 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399403] [32239] 0 32239 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399412] [32241] 0 32241 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399421] [32255] 0 32255 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399430] [32258] 0 32258 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399439] [32263] 0 32263 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399448] [32293] 0 32293 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399457] [32295] 0 32295 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399467] [32313] 0 32313 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399476] [32324] 0 32324 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399485] [32329] 0 32329 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399494] [32367] 0 32367 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399503] [32369] 0 32369 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399512] [32371] 0 32371 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399521] [32405] 0 32405 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399530] [32409] 0 32409 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399539] [32413] 0 32413 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399548] [32432] 0 32432 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399557] [32436] 0 32436 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399566] [32474] 0 32474 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399580] [32477] 0 32477 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399589] [32488] 0 32488 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399599] [32528] 0 32528 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399608] [32535] 0 32535 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399617] [32537] 0 32537 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399626] [32576] 0 32576 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399635] [32578] 0 32578 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399644] [32580] 0 32580 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399653] [32611] 0 32611 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399662] [32615] 0 32615 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399671] [32621] 0 32621 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399680] [32639] 0 32639 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399690] [32641] 0 32641 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399698] [32658] 0 32658 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399708] [32661] 0 32661 18179 13262 32 3 0 0 syz-executor.5 [ 532.399717] [32662] 0 32662 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399726] [32670] 0 32670 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399735] [32681] 0 32681 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399745] [32682] 0 32682 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399754] [32689] 0 32689 18114 241 23 3 0 0 syz-executor.1 [ 532.399763] [32690] 0 32690 18113 8952 24 4 0 0 syz-executor.1 [ 532.399772] [ 483] 0 483 18179 13262 32 3 0 0 syz-executor.5 [ 532.399781] [ 485] 0 485 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399790] [ 492] 0 492 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399799] [ 493] 0 493 18179 13262 32 3 0 1000 syz-executor.1 [ 532.399808] [ 494] 0 494 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399817] [ 522] 0 522 18179 13262 32 3 0 1000 syz-executor.0 [ 532.399826] [ 524] 0 524 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399835] [ 549] 0 549 18179 13262 32 3 0 0 syz-executor.5 [ 532.399844] [ 558] 0 558 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399853] [ 572] 0 572 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399862] [ 575] 0 575 18179 13262 32 3 0 1000 syz-executor.1 [ 532.399872] [ 602] 0 602 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399881] [ 609] 0 609 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399890] [ 617] 0 617 18179 13262 32 3 0 0 syz-executor.5 [ 532.399899] [ 638] 0 638 18179 13262 32 3 0 1000 syz-executor.1 [ 532.399908] [ 640] 0 640 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399916] [ 641] 0 641 18179 13262 32 3 0 0 syz-executor.5 [ 532.399926] [ 647] 0 647 18179 13262 32 3 0 1000 syz-executor.3 [ 532.399935] [ 650] 0 650 18179 13262 32 3 0 1000 syz-executor.2 [ 532.399944] [ 665] 0 665 18146 8741 24 3 0 0 syz-executor.5 [ 532.399953] [ 667] 0 667 18146 8736 24 3 0 1000 syz-executor.0 [ 532.399963] [ 673] 0 673 18146 8741 24 3 0 0 syz-executor.5 [ 532.399971] [ 680] 0 680 18146 8741 24 3 0 0 syz-executor.5 [ 532.399987] [ 685] 0 685 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400127] [ 693] 0 693 18146 8736 24 3 0 1000 syz-executor.0 [ 532.400137] [ 695] 0 695 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400145] [ 706] 0 706 18146 8738 24 3 0 1000 syz-executor.1 [ 532.400154] [ 721] 0 721 18146 8738 24 3 0 1000 syz-executor.1 [ 532.400163] [ 723] 0 723 18146 8741 24 3 0 0 syz-executor.5 [ 532.400172] [ 727] 0 727 18146 8734 24 3 0 0 syz-executor.5 [ 532.400181] [ 731] 0 731 18146 8734 24 3 0 0 syz-executor.5 [ 532.400191] [ 736] 0 736 18146 8734 24 3 0 0 syz-executor.5 [ 532.400200] [ 738] 0 738 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400209] [ 740] 0 740 18179 13262 32 3 0 1000 syz-executor.0 [ 532.400219] [ 746] 0 746 18146 8731 24 3 0 1000 syz-executor.1 [ 532.400228] [ 747] 0 747 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400237] [ 782] 0 782 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400246] [ 786] 0 786 18179 13262 32 3 0 1000 syz-executor.1 [ 532.400255] [ 787] 0 787 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400264] [ 815] 0 815 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400273] [ 816] 0 816 18146 8740 24 3 0 1000 syz-executor.4 [ 532.400282] [ 822] 0 822 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400292] [ 837] 0 837 18146 8738 24 3 0 1000 syz-executor.1 [ 532.400301] [ 839] 0 839 18146 8734 24 3 0 0 syz-executor.5 [ 532.400310] [ 844] 0 844 18146 8733 24 3 0 1000 syz-executor.4 [ 532.400320] [ 847] 0 847 18146 8734 24 3 0 0 syz-executor.5 [ 532.400328] [ 850] 0 850 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400338] [ 852] 0 852 18146 8734 24 3 0 0 syz-executor.5 [ 532.400347] [ 857] 0 857 18146 8731 24 3 0 1000 syz-executor.1 [ 532.400356] [ 860] 0 860 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400365] [ 872] 0 872 18146 8733 24 3 0 1000 syz-executor.4 [ 532.400374] [ 883] 0 883 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400383] [ 899] 0 899 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400392] [ 901] 0 901 18179 13262 32 3 0 0 syz-executor.5 [ 532.400406] [ 903] 0 903 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400415] [ 934] 0 934 18179 13262 32 3 0 0 syz-executor.5 [ 532.400425] [ 936] 0 936 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400434] [ 939] 0 939 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400443] [ 941] 0 941 18179 13262 32 3 0 1000 syz-executor.4 [ 532.400452] [ 955] 0 955 18146 8964 26 4 0 1000 syz-executor.1 [ 532.400461] [ 960] 0 960 18212 13293 32 3 0 1000 syz-executor.4 [ 532.400475] [ 964] 0 964 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400484] [ 981] 0 981 18146 8740 24 3 0 1000 syz-executor.4 [ 532.400493] [ 999] 0 999 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400501] [ 1001] 0 1001 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400510] [ 1019] 0 1019 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400519] [ 1021] 0 1021 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400528] [ 1051] 0 1051 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400537] [ 1054] 0 1054 18179 13262 32 3 0 1000 syz-executor.4 [ 532.400546] [ 1075] 0 1075 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400555] [ 1108] 0 1108 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400564] [ 1147] 0 1147 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400573] [ 1153] 0 1153 18179 13262 32 3 0 1000 syz-executor.4 [ 532.400583] [ 1168] 0 1168 18212 13293 32 3 0 1000 syz-executor.4 [ 532.400592] [ 1170] 0 1170 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400601] [ 1199] 0 1199 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400610] [ 1203] 0 1203 18179 13262 32 3 0 1000 syz-executor.4 [ 532.400619] [ 1219] 0 1219 18212 13294 32 3 0 1000 syz-executor.4 [ 532.400629] [ 1230] 0 1230 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400637] [ 1233] 0 1233 3648 41 11 3 0 0 getty [ 532.400646] [ 1234] 0 1234 3648 42 13 4 0 0 getty [ 532.400656] [ 1235] 0 1235 3648 41 13 3 0 0 getty [ 532.400665] [ 1236] 0 1236 3648 43 13 3 0 0 getty [ 532.400674] [ 1237] 0 1237 3648 42 12 3 0 0 getty [ 532.400684] [ 1238] 0 1238 3648 43 13 3 0 0 getty [ 532.400693] [ 1243] 0 1243 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400705] [ 1263] 0 1263 18179 13262 32 3 0 1000 syz-executor.3 [ 532.400780] [ 1265] 0 1265 18179 13262 32 3 0 1000 syz-executor.4 [ 532.400789] [ 1271] 0 1271 18179 13262 32 3 0 1000 syz-executor.2 [ 532.400799] [ 1273] 0 1273 18212 13293 32 3 0 1000 syz-executor.3 [ 532.400808] [ 1276] 0 1276 18212 13293 32 3 0 1000 syz-executor.4 [ 532.400817] [ 1280] 0 1280 18212 13293 32 3 0 1000 syz-executor.2